Adversarial Learning

LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples

Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04
Hallucination
Vulnerability of Adversarial Examples
Adversarial Learning

Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems

Authors: Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim | Published: 2022-07-11
Poisoning
Attack Type
Adversarial Learning

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04
Network Slicing
Risk Assessment Method
Adversarial Learning

IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound

Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31
Algorithm Design
Efficient Proof System
Adversarial Learning

Private Graph Extraction via Feature Explanations

Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla | Published: 2022-06-29 | Updated: 2023-11-02
Attack Methods against DFL
Privacy Risk Management
Adversarial Learning

A Framework for Understanding Model Extraction Attack and Defense

Authors: Xun Xian, Mingyi Hong, Jie Ding | Published: 2022-06-23
Algorithm Design
Membership Inference
Adversarial Learning

ROSE: A RObust and SEcure DNN Watermarking

Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22
DNN IP Protection Method
Adversarial Learning
Evaluation Method

The Privacy Onion Effect: Memorization is Relative

Authors: Nicholas Carlini, Matthew Jagielski, Chiyuan Zhang, Nicolas Papernot, Andreas Terzis, Florian Tramer | Published: 2022-06-21 | Updated: 2022-06-22
Membership Inference
Label Inference Attack
Adversarial Learning

Architectural Backdoors in Neural Networks

Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15
Adversarial Learning
Adversarial attack
Threat Model

Reconstructing Training Data from Trained Neural Networks

Authors: Niv Haim, Gal Vardi, Gilad Yehudai, Ohad Shamir, Michal Irani | Published: 2022-06-15 | Updated: 2022-12-05
Hyperparameter Tuning
Performance Evaluation Metrics
Adversarial Learning