Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03 Adversarial ExampleAdversarial attackWatermark Robustness 2023.08.02 2025.05.28 Literature Database
Adversarial training for tabular data with attack propagation Authors: Tiago Leon Melo, João Bravo, Marco O. P. Sampaio, Paolo Romano, Hugo Ferreira, João Tiago Ascensão, Pedro Bizarro | Published: 2023-07-28 Adversarial ExampleAdversarial Spectrum Attack DetectionTime-Related Features 2023.07.28 2025.05.28 Literature Database
Why Don’t You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations Authors: Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia | Published: 2023-07-24 | Updated: 2023-07-27 Attack MethodAdversarial ExamplePhysical attack 2023.07.24 2025.05.28 Literature Database
Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs Authors: Eugene Bagdasaryan, Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov | Published: 2023-07-19 | Updated: 2023-10-03 Indirect Prompt InjectionMalicious PromptAdversarial Example 2023.07.19 2025.05.28 Literature Database
Discretization-based ensemble model for robust learning in IoT Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18 Robustness EvaluationAdversarial ExampleMachine Learning Method 2023.07.18 2025.05.28 Literature Database
Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03 Adversarial ExampleAdversarial attackThreat modeling 2023.07.03 2025.05.28 Literature Database
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola | Published: 2023-06-27 Malware ClassificationAdversarial ExampleAdversarial Attack Methods 2023.06.27 2025.05.28 Literature Database
Are aligned neural networks adversarially aligned? Authors: Nicholas Carlini, Milad Nasr, Christopher A. Choquette-Choo, Matthew Jagielski, Irena Gao, Anas Awadalla, Pang Wei Koh, Daphne Ippolito, Katherine Lee, Florian Tramer, Ludwig Schmidt | Published: 2023-06-26 | Updated: 2024-05-06 Prompt InjectionAdversarial ExampleAdversarial Attack Methods 2023.06.26 2025.05.28 Literature Database
Boosting Model Inversion Attacks with Adversarial Examples Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24 PoisoningAdversarial ExampleAdversarial attack 2023.06.24 2025.05.28 Literature Database
Adversarial Training Should Be Cast as a Non-Zero-Sum Game Authors: Alexander Robey, Fabian Latorre, George J. Pappas, Hamed Hassani, Volkan Cevher | Published: 2023-06-19 | Updated: 2024-03-18 AlgorithmAdversarial ExampleOptimization Methods 2023.06.19 2025.05.28 Literature Database