Adversarial Example

Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers

Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01
Poisoning
Adversarial Example
Evaluation Method

Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks

Authors: Hetvi Waghela, Jaydip Sen, Sneha Rakshit | Published: 2024-08-20
Poisoning
Adversarial Example
Defense Method

PhishLang: A Lightweight, Client-Side Phishing Detection Framework using MobileBERT for Real-Time, Explainable Threat Mitigation

Authors: Sayak Saha Roy, Shirin Nilizadeh | Published: 2024-08-11 | Updated: 2024-09-09
Phishing Detection
Adversarial Example
Explainable Blocklist

LaFA: Latent Feature Attacks on Non-negative Matrix Factorization

Authors: Minh Vu, Ben Nebgen, Erik Skau, Geigh Zollicoffer, Juan Castorena, Kim Rasmussen, Boian Alexandrov, Manish Bhattarai | Published: 2024-08-07
Watermarking
Attack Method
Adversarial Example

Can Reinforcement Learning Unlock the Hidden Dangers in Aligned Large Language Models?

Authors: Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-08-05
Prompt Injection
Reinforcement Learning
Adversarial Example

On the Robustness of Malware Detectors to Adversarial Samples

Authors: Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kaafar | Published: 2024-08-05
Watermarking
Malware Classification
Adversarial Example

A Geometric Framework for Adversarial Vulnerability in Machine Learning

Authors: Brian Bell | Published: 2024-07-03
Poisoning
Adversarial Example
Literature List

The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI

Authors: Christopher Burger, Charles Walter, Thai Le | Published: 2024-06-22 | Updated: 2025-01-17
Adversarial Example
Evaluation Method
Similarity Measurement

Nonlinear Transformations Against Unlearnable Datasets

Authors: Thushari Hapuarachchi, Jing Lin, Kaiqi Xiong, Mohamed Rahouti, Gitte Ost | Published: 2024-06-05
Data Protection Method
Model Performance Evaluation
Adversarial Example

Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples

Authors: Matous Kozak, Luca Demetrio, Dmitrijs Trizna, Fabio Roli | Published: 2024-05-04
Malware Classification
Adversarial Example
Adversarial Training