CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations Authors: Xiaohu Li, Yunfeng Ning, Zepeng Bao, Mayi Xu, Jianhao Chen, Tieyun Qian | Published: 2025-07-08 Prompt InjectionAdversarial attackDefense Effectiveness Analysis 2025.07.08 2025.07.10 Literature Database
TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting Authors: Michael Wrana, Uzma Maroof, Diogo Barradas | Published: 2025-05-20 ウェブサイトトレースの可視化Efficiency EvaluationDefense Effectiveness Analysis 2025.05.20 2025.05.28 Literature Database
Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions Authors: Yunfei Yang, Xiaojun Chen, Yuexin Xuan, Zhendong Zhao | Published: 2025-03-23 Model Extraction AttackMalicious ClientDefense Effectiveness Analysis 2025.03.23 2025.05.27 Literature Database
Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency Authors: Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Changting Lin | Published: 2022-06-11 Federated LearningWeight Update MethodDefense Effectiveness Analysis 2022.06.11 2025.05.28 Literature Database
Membership Inference Attack on Graph Neural Networks Authors: Iyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla | Published: 2021-01-17 | Updated: 2021-12-18 Membership InferencePerformance EvaluationDefense Effectiveness Analysis 2021.01.17 2025.05.28 Literature Database
FLAME: Taming Backdoors in Federated Learning (Extended Version 1) Authors: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider | Published: 2021-01-06 | Updated: 2023-08-05 Backdoor Attack TechniquesPoisoningDefense Effectiveness Analysis 2021.01.06 2025.05.28 Literature Database
On the Effectiveness of Regularization Against Membership Inference Attacks Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2020-06-09 Privacy AssessmentImprovement of LearningDefense Effectiveness Analysis 2020.06.09 2025.05.28 Literature Database
Tricking Adversarial Attacks To Fail Authors: Blerta Lindqvist | Published: 2020-06-08 Attack TypeAdversarial Attack DetectionDefense Effectiveness Analysis 2020.06.08 2025.05.28 Literature Database
Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense Authors: Jay N. Paranjape, Rahul Kumar Dubey, Vijendran V Gopalan | Published: 2020-06-02 PoisoningAttack TypeDefense Effectiveness Analysis 2020.06.02 2025.05.28 Literature Database
Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods Authors: Kyungmi Lee, Anantha P. Chandrakasan | Published: 2020-06-01 PoisoningAdversarial Attack DetectionDefense Effectiveness Analysis 2020.06.01 2025.05.28 Literature Database