SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22 Adversarial LearningComputational ComplexityDefense Mechanism 2025.05.22 2025.05.28 Literature Database
Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval Authors: Taiye Chen, Zeming Wei, Ang Li, Yisen Wang | Published: 2025-05-21 RAGLarge Language ModelDefense Mechanism 2025.05.21 2025.05.28 Literature Database
Alignment Under Pressure: The Case for Informed Adversaries When Evaluating LLM Defenses Authors: Xiaoxue Yang, Bozhidar Stevanoski, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2025-05-21 AlignmentPrompt InjectionDefense Mechanism 2025.05.21 2025.05.28 Literature Database
Model-agnostic clean-label backdoor mitigation in cybersecurity environments Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea | Published: 2024-07-11 | Updated: 2025-05-05 Backdoor DetectionBackdoor AttackDefense Mechanism 2024.07.11 2025.05.27 Literature Database
Large Language Model Sentinel: LLM Agent for Adversarial Purification Authors: Guang Lin, Toshihisa Tanaka, Qibin Zhao | Published: 2024-05-24 | Updated: 2025-04-23 Prompt validationAdversarial Text PurificationDefense Mechanism 2024.05.24 2025.05.27 Literature Database
ModSec-AdvLearn: Countering Adversarial SQL Injections with Robust Machine Learning Authors: Giuseppe Floris, Christian Scano, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio | Published: 2023-08-09 | Updated: 2025-05-21 Relationship between Robustness and PrivacyAdversarial Example DetectionDefense Mechanism 2023.08.09 2025.05.28 Literature Database
Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 Model DesignAdversarial Attack DetectionDefense Mechanism 2022.09.09 2025.05.28 Literature Database
Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification Authors: Cangxiong Chen, Neill D. F. Campbell | Published: 2021-11-19 Training Data Extraction MethodReconstruction AttackDefense Mechanism 2021.11.19 2025.05.28 Literature Database
A Review of Adversarial Attack and Defense for Classification Methods Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18 Adversarial ExampleAdversarial attackDefense Mechanism 2021.11.18 2025.05.28 Literature Database
QUDOS: Quorum-Based Cloud-Edge Distributed DNNs for Security Enhanced Industry 4.0 Authors: Kevin Wallis, Christoph Reich, Blesson Varghese, Christian Schindelhauer | Published: 2021-11-09 Data Integrity ConstraintsEfficiency of Distributed LearningDefense Mechanism 2021.11.09 2025.05.28 Literature Database