Neutral Agent-based Adversarial Policy Learning against Deep Reinforcement Learning in Multi-party Open Systems Authors: Qizhou Peng, Yang Zheng, Yu Wen, Yanna Wu, Yingying Du | Published: 2025-10-13 Adversarial LearningDeep Reinforcement LearningDefense Effectiveness Analysis 2025.10.13 2025.10.15 Literature Database
A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems Authors: Hikmat A. M. Abdeljaber, Md. Alamgir Hossain, Sultan Ahmad, Ahmed Alsanad, Md Alimul Haque, Sudan Jha, Jabeen Nazeer | Published: 2025-10-09 IoT Security ChallengesDefense MechanismDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database
Fewer Weights, More Problems: A Practical Attack on LLM Pruning Authors: Kazuki Egashira, Robin Staab, Thibaud Gloaguen, Mark Vero, Martin Vechev | Published: 2025-10-09 Security Analysis MethodPrompt InjectionDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses Authors: Xiangtao Meng, Tianshuo Cong, Li Wang, Wenyu Chen, Zheng Li, Shanqing Guo, Xiaoyun Wang | Published: 2025-10-09 AlignmentIndirect Prompt InjectionDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database
CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations Authors: Xiaohu Li, Yunfeng Ning, Zepeng Bao, Mayi Xu, Jianhao Chen, Tieyun Qian | Published: 2025-07-08 Prompt InjectionAdversarial attackDefense Effectiveness Analysis 2025.07.08 2025.07.10 Literature Database
TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting Authors: Michael Wrana, Uzma Maroof, Diogo Barradas | Published: 2025-05-20 ウェブサイトトレースの可視化Efficiency EvaluationDefense Effectiveness Analysis 2025.05.20 2025.05.28 Literature Database
CEE: An Inference-Time Jailbreak Defense for Embodied Intelligence via Subspace Concept Rotation Authors: Jirui Yang, Zheyu Lin, Zhihui Lu, Yinggui Wang, Lei Wang, Tao Wei, Xin Du, Shuhan Yang | Published: 2025-04-15 | Updated: 2025-07-31 Prompt InjectionRobustness of Watermarking TechniquesDefense Effectiveness Analysis 2025.04.15 2025.08.02 Literature Database
Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions Authors: Yunfei Yang, Xiaojun Chen, Yuexin Xuan, Zhendong Zhao | Published: 2025-03-23 Model Extraction AttackMalicious ClientDefense Effectiveness Analysis 2025.03.23 2025.05.27 Literature Database
Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency Authors: Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Changting Lin | Published: 2022-06-11 Federated LearningWeight Update MethodDefense Effectiveness Analysis 2022.06.11 2025.05.28 Literature Database
Membership Inference Attack on Graph Neural Networks Authors: Iyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla | Published: 2021-01-17 | Updated: 2021-12-18 Membership InferencePerformance EvaluationDefense Effectiveness Analysis 2021.01.17 2025.05.28 Literature Database