Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2024-04-09 PoisoningAttack MethodDefense Method 2024.04.09 2025.05.27 Literature Database
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry | Published: 2024-04-05 PoisoningFederated LearningDefense Method 2024.04.05 2025.05.27 Literature Database
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov | Published: 2024-03-20 | Updated: 2024-06-07 Attack MethodAdversarial ExampleDefense Method 2024.03.20 2025.05.27 Literature Database
AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14 Prompt InjectionStructural AttackDefense Method 2024.03.14 2025.05.27 Literature Database
EdgeLeakage: Membership Information Leakage in Distributed Edge Intelligence Systems Authors: Kongyang Chen, Yi Lin, Hui Luo, Bing Mi, Yatie Xiao, Chao Ma, Jorge Sá Silva | Published: 2024-03-08 WatermarkingMembership InferenceDefense Method 2024.03.08 2025.05.27 Literature Database
Enhancing Security in Federated Learning through Adaptive Consensus-Based Model Update Validation Authors: Zahir Alsulaimawi | Published: 2024-03-05 PoisoningFederated LearningDefense Method 2024.03.05 2025.05.27 Literature Database
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees Authors: Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei | Published: 2024-03-05 Backdoor AttackPoisoningDefense Method 2024.03.05 2025.05.27 Literature Database
DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks Authors: Yinghua Hu, Kaixin Yang, Subhajit Dutta Chowdhury, Pierluigi Nuzzo | Published: 2024-03-04 WatermarkingWatermark RobustnessDefense Method 2024.03.04 2025.05.27 Literature Database
Improving behavior based authentication against adversarial attack using XAI Authors: Dong Qin, George Amariucai, Daji Qiao, Yong Guan | Published: 2024-02-26 | Updated: 2024-03-10 Adversarial TrainingFeature Selection MethodDefense Method 2024.02.26 2025.05.27 Literature Database
A Comprehensive Study of Jailbreak Attack versus Defense for Large Language Models Authors: Zihao Xu, Yi Liu, Gelei Deng, Yuekang Li, Stjepan Picek | Published: 2024-02-21 | Updated: 2024-05-17 LLM SecurityPrompt InjectionDefense Method 2024.02.21 2025.05.27 Literature Database