Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework Authors: Xia Du, Xiaoyuan Liu, Jizhe Zhou, Zheng Lin, Chi-man Pun, Zhe Chen, Wei Ni, Jun Luo | Published: 2025-06-12 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2025.06.12 2025.06.14 Literature Database
Adversarial Surrogate Risk Bounds for Binary Classification Authors: Natalie S. Frank | Published: 2025-06-11 Certified RobustnessConvergence AnalysisFunction Boundary Pair Formation 2025.06.11 2025.06.13 Literature Database
Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09 Certified RobustnessRobust OptimizationAdversarial Attack Methods 2025.06.09 2025.06.11 Literature Database
LLM Unlearning Should Be Form-Independent Authors: Xiaotian Ye, Mengqi Zhang, Shu Wu | Published: 2025-06-09 Training MethodCertified Robustness非意味的リダイレクション 2025.06.09 2025.06.11 Literature Database
Adversarially Pretrained Transformers may be Universally Robust In-Context Learners Authors: Soichiro Kumano, Hiroshi Kera, Toshihiko Yamasaki | Published: 2025-05-20 Certified RobustnessRelationship between Robustness and PrivacyAdversarial Learning 2025.05.20 2025.05.28 Literature Database
Quantum Support Vector Regression for Robust Anomaly Detection Authors: Kilian Tscharke, Maximilian Wendlinger, Sebastian Issel, Pascal Debus | Published: 2025-05-02 | Updated: 2025-05-13 Certified RobustnessAnomaly Detection MethodRole of Quantum Machine Learning 2025.05.02 2025.05.28 Literature Database
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations Authors: Ahod Alghuried, Ali Alkinoon, Abdulaziz Alghamdi, Soohyeon Choi, Manar Mohaisen, David Mohaisen | Published: 2025-04-24 Detection Rate of Phishing AttacksCertified RobustnessAdversarial Example Detection 2025.04.24 2025.05.27 Literature Database
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems Authors: Song Xia, Yi Yu, Wenhan Yang, Meiwen Ding, Zhuo Chen, Ling-Yu Duan, Alex C. Kot, Xudong Jiang | Published: 2025-03-01 | Updated: 2025-04-03 Privacy ProtectionCertified RobustnessModel Performance Evaluation 2025.03.01 2025.05.27 Literature Database
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks Authors: Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou | Published: 2024-06-18 | Updated: 2025-04-14 Certified RobustnessReconstruction AttackAdversarial Attack Detection 2024.06.18 2025.05.27 Literature Database
LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts Authors: Shoupeng Ren, Lipeng He, Tianyu Tu, Di Wu, Jian Liu, Kui Ren, Chun Chen | Published: 2024-01-14 | Updated: 2025-04-02 Smart ContractCertified RobustnessModel Performance Evaluation 2024.01.14 2025.05.27 Literature Database