Adversarial Example

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay | Published: 2024-02-19
Model Extraction Attack
Classification Pattern Analysis
Adversarial Example

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics

Authors: Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu | Published: 2024-02-14
Adversarial Example
Adversarial Spectrum Attack Detection
Adversarial Attack Detection

PAC-Bayesian Adversarially Robust Generalization Bounds for Graph Neural Network

Authors: Tan Sun, Junhong Lin | Published: 2024-02-06 | Updated: 2024-07-06
Graph Neural Network
Adversarial Example
Watermark Evaluation

A Training Rate and Survival Heuristic for Inference and Robustness Evaluation (TRASHFIRE)

Authors: Charles Meyers, Mohammad Reza Saleh Sedghpour, Tommy Löfstedt, Erik Elmroth | Published: 2024-01-24 | Updated: 2024-09-11
Hyperparameter Tuning
Model Performance Evaluation
Adversarial Example

Defenses in Adversarial Machine Learning: A Survey

Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13
Poisoning
Adversarial Example
Defense Method

SoK: Unintended Interactions among Machine Learning Defenses and Risks

Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan | Published: 2023-12-07 | Updated: 2024-04-04
Watermarking
Adversarial Example
Overfitting and Memorization

Poisoning Retrieval Corpora by Injecting Adversarial Passages

Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29
Poisoning attack on RAG
Poisoning
Adversarial Example

Instability of computer vision models is a necessary result of the task itself

Authors: Oliver Turnbull, George Cevora | Published: 2023-10-26
Robustness Evaluation
Adversarial Example
Dimensionality Reduction Method

Attack Prompt Generation for Red Teaming and Defending Large Language Models

Authors: Boyi Deng, Wenjie Wang, Fuli Feng, Yang Deng, Qifan Wang, Xiangnan He | Published: 2023-10-19
Prompt Injection
Attack Evaluation
Adversarial Example

The Efficacy of Transformer-based Adversarial Attacks in Security Domains

Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17
Security Analysis
Model Design
Adversarial Example