Enhancing Robustness of Graph Neural Networks through p-Laplacian Authors: Anuj Kumar Sirohi, Subhanu Halder, Kabir Kumar, Sandeep Kumar | Published: 2024-09-27 Optimization ProblemDefense Method 2024.09.27 2025.05.27 Literature Database
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm Authors: Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin | Published: 2024-09-21 | Updated: 2024-10-06 Backdoor AttackModel Performance EvaluationDefense Method 2024.09.21 2025.05.27 Literature Database
Defending against Model Inversion Attacks via Random Erasing Authors: Viet-Hung Tran, Ngoc-Bao Nguyen, Son T. Mai, Hans Vandierendonck, Ngai-man Cheung | Published: 2024-09-02 WatermarkingPrivacy Protection MethodDefense Method 2024.09.02 2025.05.27 Literature Database
EEG-Defender: Defending against Jailbreak through Early Exit Generation of Large Language Models Authors: Chongwen Zhao, Zhihao Dou, Kaizhu Huang | Published: 2024-08-21 LLM SecurityPrompt InjectionDefense Method 2024.08.21 2025.05.27 Literature Database
Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks Authors: Hetvi Waghela, Jaydip Sen, Sneha Rakshit | Published: 2024-08-20 PoisoningAdversarial ExampleDefense Method 2024.08.20 2025.05.27 Literature Database
Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning Authors: Joon Kim, Sejin Park | Published: 2024-08-15 WatermarkingPoisoningDefense Method 2024.08.15 2025.05.27 Literature Database
Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Weiming Zhang | Published: 2024-08-15 | Updated: 2024-08-22 LLM SecurityPrompt InjectionDefense Method 2024.08.15 2025.05.27 Literature Database
Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08 DoS MitigationPrivacy Protection MethodDefense Method 2024.08.08 2025.05.27 Literature Database
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06 Phishing DetectionModel Performance EvaluationDefense Method 2024.08.06 2025.05.27 Literature Database
Mitigating Malicious Attacks in Federated Learning via Confidence-aware Defense Authors: Qilei Li, Ahmed M. Abdelmoniem | Published: 2024-08-05 | Updated: 2024-08-16 DoS MitigationPoisoningDefense Method 2024.08.05 2025.05.27 Literature Database