Adversarial Example

Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks

Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03
Adversarial Example
Adversarial attack
Watermark Robustness

Adversarial training for tabular data with attack propagation

Authors: Tiago Leon Melo, João Bravo, Marco O. P. Sampaio, Paolo Romano, Hugo Ferreira, João Tiago Ascensão, Pedro Bizarro | Published: 2023-07-28
Adversarial Example
Adversarial Spectrum Attack Detection
Time-Related Features

Why Don’t You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations

Authors: Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia | Published: 2023-07-24 | Updated: 2023-07-27
Attack Method
Adversarial Example
Physical attack

Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

Authors: Eugene Bagdasaryan, Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov | Published: 2023-07-19 | Updated: 2023-10-03
Indirect Prompt Injection
Malicious Prompt
Adversarial Example

Discretization-based ensemble model for robust learning in IoT

Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18
Robustness Evaluation
Adversarial Example
Machine Learning Method

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03
Adversarial Example
Adversarial attack
Threat modeling

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola | Published: 2023-06-27
Malware Classification
Adversarial Example
Adversarial Attack Methods

Are aligned neural networks adversarially aligned?

Authors: Nicholas Carlini, Milad Nasr, Christopher A. Choquette-Choo, Matthew Jagielski, Irena Gao, Anas Awadalla, Pang Wei Koh, Daphne Ippolito, Katherine Lee, Florian Tramer, Ludwig Schmidt | Published: 2023-06-26 | Updated: 2024-05-06
Prompt Injection
Adversarial Example
Adversarial Attack Methods

Boosting Model Inversion Attacks with Adversarial Examples

Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24
Poisoning
Adversarial Example
Adversarial attack

Adversarial Training Should Be Cast as a Non-Zero-Sum Game

Authors: Alexander Robey, Fabian Latorre, George J. Pappas, Hamed Hassani, Volkan Cevher | Published: 2023-06-19 | Updated: 2024-03-18
Algorithm
Adversarial Example
Optimization Methods