DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23 Model ArchitectureCertified RobustnessAdversarial Attack Analysis 2025.06.23 2025.06.25 Literature Database
Exploring Backdoor Attack and Defense for LLM-empowered Recommendations Authors: Liangbo Ning, Wenqi Fan, Qing Li | Published: 2025-04-15 LLM Performance EvaluationPoisoning attack on RAGAdversarial Attack Analysis 2025.04.15 2025.05.27 Literature Database
Bypassing Prompt Injection and Jailbreak Detection in LLM Guardrails Authors: William Hackett, Lewis Birch, Stefan Trawicki, Neeraj Suri, Peter Garraghan | Published: 2025-04-15 | Updated: 2025-04-16 LLM Performance EvaluationPrompt InjectionAdversarial Attack Analysis 2025.04.15 2025.05.27 Literature Database
Adversarial Attacks Against Medical Deep Learning Systems Authors: Samuel G. Finlayson, Hyung Won Chung, Isaac S. Kohane, Andrew L. Beam | Published: 2018-04-15 | Updated: 2019-02-04 Adversarial LearningAdversarial Attack AnalysisDeep Learning 2018.04.15 2025.05.28 Literature Database
A Grid Based Adversarial Clustering Algorithm Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21 Data Contamination DetectionAdversarial Attack AnalysisAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database
Label Sanitization against Label Flipping Poisoning Attacks Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02 Adversarial Attack AnalysisMachine Learning TechnologyDetection of Poisonous Data 2018.03.02 2025.05.28 Literature Database
Generalized Byzantine-tolerant SGD Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-02-27 | Updated: 2018-03-23 Robust EstimationAdversarial Attack AnalysisMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Understanding and Enhancing the Transferability of Adversarial Examples Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27 Model evaluation methodsAdversarial LearningAdversarial Attack Analysis 2018.02.27 2025.05.28 Literature Database
Robust GANs against Dishonest Adversaries Authors: Zhi Xu, Chengtao Li, Stefanie Jegelka | Published: 2018-02-27 | Updated: 2019-10-10 Robust EstimationAdversarial Attack AnalysisAdversarial Training 2018.02.27 2025.05.28 Literature Database
On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27 Adversarial Example DetectionAdversarial Attack AnalysisMachine Learning Technology 2018.02.27 2025.05.28 Literature Database