A Robust Semantics-based Watermark for Large Language Model against Paraphrasing Authors: Jie Ren, Han Xu, Yiding Liu, Yingqian Cui, Shuaiqiang Wang, Dawei Yin, Jiliang Tang | Published: 2023-11-15 | Updated: 2024-04-01 Prompt InjectionRobustness EvaluationInformation Hiding Techniques 2023.11.15 2025.05.28 Literature Database
Tensor Trust: Interpretable Prompt Injection Attacks from an Online Game Authors: Sam Toyer, Olivia Watkins, Ethan Adrian Mendes, Justin Svegliato, Luke Bailey, Tiffany Wang, Isaac Ong, Karim Elmaaroufi, Pieter Abbeel, Trevor Darrell, Alan Ritter, Stuart Russell | Published: 2023-11-02 Prompt InjectionPrompt EngineeringRobustness Evaluation 2023.11.02 2025.05.28 Literature Database
Unified Enhancement of Privacy Bounds for Mixture Mechanisms via $f$-Differential Privacy Authors: Chendi Wang, Buxin Su, Jiayuan Ye, Reza Shokri, Weijie J. Su | Published: 2023-10-30 | Updated: 2023-11-01 Privacy TechniqueRobustness EvaluationComputational Efficiency 2023.10.30 2025.05.28 Literature Database
Balance, Imbalance, and Rebalance: Understanding Robust Overfitting from a Minimax Game Perspective Authors: Yifei Wang, Liangchen Li, Jiansheng Yang, Zhouchen Lin, Yisen Wang | Published: 2023-10-30 Robustness EvaluationAdversarial TrainingAdaptive Adversarial Training 2023.10.30 2025.05.28 Literature Database
Discretization-based ensemble model for robust learning in IoT Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18 Robustness EvaluationAdversarial ExampleMachine Learning Method 2023.07.18 2025.05.28 Literature Database
On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms Authors: Yinglun Xu, Bhuvesh Kumar, Jacob Abernethy | Published: 2023-07-15 Algorithm DesignRobustness EvaluationEfficient Resolution of Learning Tasks 2023.07.15 2025.05.28 Literature Database
Unifying Gradients to Improve Real-world Robustness for Deep Networks Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24 Robustness EvaluationPerformance Evaluation MetricsAttack Method 2022.08.12 2025.05.28 Literature Database
Robust Machine Learning for Malware Detection over Time Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio | Published: 2022-08-09 Malware Detection MethodRobustness EvaluationMachine Learning Method 2022.08.09 2025.05.28 Literature Database
Federated Adversarial Learning: A Framework with Convergence Analysis Authors: Xiaoxiao Li, Zhao Song, Jiaming Yang | Published: 2022-08-07 Robustness EvaluationAdaptive Adversarial TrainingWeight Update Method 2022.08.07 2025.05.28 Literature Database
Lethal Dose Conjecture on Data Poisoning Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-08-05 | Updated: 2022-10-18 Robustness EvaluationClassification Pattern AnalysisMachine Learning Method 2022.08.05 2025.05.28 Literature Database