LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04 HallucinationVulnerability of Adversarial ExamplesAdversarial Learning 2023.10.02 2025.05.28 Literature Database
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems Authors: Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim | Published: 2022-07-11 PoisoningAttack TypeAdversarial Learning 2022.07.11 2025.05.28 Literature Database
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04 Network SlicingRisk Assessment MethodAdversarial Learning 2022.07.04 2025.05.28 Literature Database
IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31 Algorithm DesignEfficient Proof SystemAdversarial Learning 2022.06.29 2025.05.28 Literature Database
Private Graph Extraction via Feature Explanations Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla | Published: 2022-06-29 | Updated: 2023-11-02 Attack Methods against DFLPrivacy Risk ManagementAdversarial Learning 2022.06.29 2025.05.28 Literature Database
A Framework for Understanding Model Extraction Attack and Defense Authors: Xun Xian, Mingyi Hong, Jie Ding | Published: 2022-06-23 Algorithm DesignMembership InferenceAdversarial Learning 2022.06.23 2025.05.28 Literature Database
ROSE: A RObust and SEcure DNN Watermarking Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22 DNN IP Protection MethodAdversarial LearningEvaluation Method 2022.06.22 2025.05.28 Literature Database
The Privacy Onion Effect: Memorization is Relative Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer | Published: 2022-06-21 | Updated: 2022-06-22 Membership InferenceLabel Inference AttackAdversarial Learning 2022.06.21 2025.05.28 Literature Database
Architectural Backdoors in Neural Networks Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15 Adversarial LearningAdversarial attackThreat Model 2022.06.15 2025.05.28 Literature Database
Reconstructing Training Data from Trained Neural Networks Authors: Niv Haim, Gal Vardi, Gilad Yehudai, Ohad Shamir, Michal Irani | Published: 2022-06-15 | Updated: 2022-12-05 Hyperparameter TuningPerformance Evaluation MetricsAdversarial Learning 2022.06.15 2025.05.28 Literature Database