Adversarially Robust Deep Learning with Optimal-Transport-Regularized Divergences Authors: Jeremiah Birrell, Mohammadreza Ebrahimi | Published: 2023-09-07 Malicious Demo ConstructionAdversarial attackDefense Method 2023.09.07 2025.05.28 Literature Database
Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22 Backdoor AttackPoisoningDefense Method 2023.08.22 2025.05.28 Literature Database
A Review of Adversarial Attacks in Computer Vision Authors: Yutong Zhang, Yao Li, Yin Li, Zhichang Guo | Published: 2023-08-15 PoisoningAdversarial Attack MethodsDefense Method 2023.08.15 2025.05.28 Literature Database
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13 Backdoor AttackAdversarial TrainingDefense Method 2023.08.13 2025.05.28 Literature Database
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning Authors: Simon Queyrut, Yérom-David Bromberg, Valerio Schiavoni | Published: 2023-08-08 WatermarkingAdversarial Attack MethodsDefense Method 2023.08.08 2025.05.28 Literature Database
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers Authors: Haomin Zhuang, Mingxian Yu, Hao Wang, Yang Hua, Jian Li, Xu Yuan | Published: 2023-08-08 | Updated: 2024-04-15 Backdoor AttackPoisoning AttackDefense Method 2023.08.08 2025.05.28 Literature Database
A reading survey on adversarial machine learning: Adversarial attacks and their understanding Authors: Shashank Kotyan | Published: 2023-08-07 Adversarial ExampleAdversarial Attack MethodsDefense Method 2023.08.07 2025.05.28 Literature Database
Membership Inference Attacks against Language Models via Neighbourhood Comparison Authors: Justus Mattern, Fatemehsadat Mireshghallah, Zhijing Jin, Bernhard Schölkopf, Mrinmaya Sachan, Taylor Berg-Kirkpatrick | Published: 2023-05-29 | Updated: 2023-08-07 LLM Performance EvaluationPrivacy Protection MethodDefense Method 2023.05.29 2025.05.28 Literature Database
COLLIDER: A Robust Training Framework for Backdoor Data Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2022-10-13 Core Set Selection MethodDeep Learning MethodDefense Method 2022.10.13 2025.05.28 Literature Database
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning Authors: Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin | Published: 2022-07-11 Algorithm DesignModel Design and AccuracyDefense Method 2022.07.11 2025.05.28 Literature Database