Defense Method

Enhancing Robustness of Graph Neural Networks through p-Laplacian

Authors: Anuj Kumar Sirohi, Subhanu Halder, Kabir Kumar, Sandeep Kumar | Published: 2024-09-27
Optimization Problem
Defense Method

Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm

Authors: Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin | Published: 2024-09-21 | Updated: 2024-10-06
Backdoor Attack
Model Performance Evaluation
Defense Method

Defending against Model Inversion Attacks via Random Erasing

Authors: Viet-Hung Tran, Ngoc-Bao Nguyen, Son T. Mai, Hans Vandierendonck, Ngai-man Cheung | Published: 2024-09-02
Watermarking
Privacy Protection Method
Defense Method

EEG-Defender: Defending against Jailbreak through Early Exit Generation of Large Language Models

Authors: Chongwen Zhao, Zhihao Dou, Kaizhu Huang | Published: 2024-08-21
LLM Security
Prompt Injection
Defense Method

Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks

Authors: Hetvi Waghela, Jaydip Sen, Sneha Rakshit | Published: 2024-08-20
Poisoning
Adversarial Example
Defense Method

Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning

Authors: Joon Kim, Sejin Park | Published: 2024-08-15
Watermarking
Poisoning
Defense Method

Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks

Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Weiming Zhang | Published: 2024-08-15 | Updated: 2024-08-22
LLM Security
Prompt Injection
Defense Method

Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era

Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08
DoS Mitigation
Privacy Protection Method
Defense Method

Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis

Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06
Phishing Detection
Model Performance Evaluation
Defense Method

Mitigating Malicious Attacks in Federated Learning via Confidence-aware Defense

Authors: Qilei Li, Ahmed M. Abdelmoniem | Published: 2024-08-05 | Updated: 2024-08-16
DoS Mitigation
Poisoning
Defense Method