Defense Effectiveness Analysis

Neutral Agent-based Adversarial Policy Learning against Deep Reinforcement Learning in Multi-party Open Systems

Authors: Qizhou Peng, Yang Zheng, Yu Wen, Yanna Wu, Yingying Du | Published: 2025-10-13
Adversarial Learning
Deep Reinforcement Learning
Defense Effectiveness Analysis

A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems

Authors: Hikmat A. M. Abdeljaber, Md. Alamgir Hossain, Sultan Ahmad, Ahmed Alsanad, Md Alimul Haque, Sudan Jha, Jabeen Nazeer | Published: 2025-10-09
IoT Security Challenges
Defense Mechanism
Defense Effectiveness Analysis

Fewer Weights, More Problems: A Practical Attack on LLM Pruning

Authors: Kazuki Egashira, Robin Staab, Thibaud Gloaguen, Mark Vero, Martin Vechev | Published: 2025-10-09
Security Analysis Method
Prompt Injection
Defense Effectiveness Analysis

From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses

Authors: Xiangtao Meng, Tianshuo Cong, Li Wang, Wenyu Chen, Zheng Li, Shanqing Guo, Xiaoyun Wang | Published: 2025-10-09
Alignment
Indirect Prompt Injection
Defense Effectiveness Analysis

CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations

Authors: Xiaohu Li, Yunfeng Ning, Zepeng Bao, Mayi Xu, Jianhao Chen, Tieyun Qian | Published: 2025-07-08
Prompt Injection
Adversarial attack
Defense Effectiveness Analysis

TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting

Authors: Michael Wrana, Uzma Maroof, Diogo Barradas | Published: 2025-05-20
ウェブサイトトレースの可視化
Efficiency Evaluation
Defense Effectiveness Analysis

CEE: An Inference-Time Jailbreak Defense for Embodied Intelligence via Subspace Concept Rotation

Authors: Jirui Yang, Zheyu Lin, Zhihui Lu, Yinggui Wang, Lei Wang, Tao Wei, Xin Du, Shuhan Yang | Published: 2025-04-15 | Updated: 2025-07-31
Prompt Injection
Robustness of Watermarking Techniques
Defense Effectiveness Analysis

Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions

Authors: Yunfei Yang, Xiaojun Chen, Yuexin Xuan, Zhendong Zhao | Published: 2025-03-23
Model Extraction Attack
Malicious Client
Defense Effectiveness Analysis

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency

Authors: Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Changting Lin | Published: 2022-06-11
Federated Learning
Weight Update Method
Defense Effectiveness Analysis

Membership Inference Attack on Graph Neural Networks

Authors: Iyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla | Published: 2021-01-17 | Updated: 2021-12-18
Membership Inference
Performance Evaluation
Defense Effectiveness Analysis