Effectiveness Analysis of Defense Methods

PandaGuard: Systematic Evaluation of LLM Safety against Jailbreaking Attacks

Authors: Guobin Shen, Dongcheng Zhao, Linghao Feng, Xiang He, Jihang Wang, Sicheng Shen, Haibo Tong, Yiting Dong, Jindong Li, Xiang Zheng, Yi Zeng | Published: 2025-05-20 | Updated: 2025-05-22
Disabling Safety Mechanisms of LLM
Prompt Injection
Effectiveness Analysis of Defense Methods

FlowPure: Continuous Normalizing Flows for Adversarial Purification

Authors: Elias Collaert, Abel Rodríguez, Sander Joos, Lieven Desmet, Vera Rimmer | Published: 2025-05-19
Robustness Improvement Method
Adversarial Learning
Effectiveness Analysis of Defense Methods

Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets

Authors: Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang | Published: 2025-04-16
Backdoor Detection
Improvement of Learning
Effectiveness Analysis of Defense Methods

STShield: Single-Token Sentinel for Real-Time Jailbreak Detection in Large Language Models

Authors: Xunguang Wang, Wenxuan Wang, Zhenlan Ji, Zongjie Li, Pingchuan Ma, Daoyuan Wu, Shuai Wang | Published: 2025-03-23
Prompt Injection
Malicious Prompt
Effectiveness Analysis of Defense Methods

Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks

Authors: Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris, Ramesh Karri | Published: 2020-04-26
Poisoning
Deep Learning Technology
Effectiveness Analysis of Defense Methods

Minimax Defense against Gradient-based Adversarial Attacks

Authors: Blerta Lindqvist, Rauf Izmailov | Published: 2020-02-04
Adversarial Perturbation Techniques
Adversarial Transferability
Effectiveness Analysis of Defense Methods

Defending Adversarial Attacks via Semantic Feature Manipulation

Authors: Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen | Published: 2020-02-03 | Updated: 2020-04-22
Robustness Improvement Method
Adversarial Example
Effectiveness Analysis of Defense Methods

Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks

Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal | Published: 2020-01-26
Adversarial Learning
Adversarial Attack Detection
Effectiveness Analysis of Defense Methods

ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense

Authors: Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi | Published: 2020-01-02 | Updated: 2020-10-16
Adversarial Learning
Watermark Evaluation
Effectiveness Analysis of Defense Methods

Benchmarking Adversarial Robustness

Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Tianyu Pang, Hang Su, Zihao Xiao, Jun Zhu | Published: 2019-12-26
Poisoning
Adversarial Example
Effectiveness Analysis of Defense Methods