Adversarial Attack Methods

Weakest Link in the Chain: Security Vulnerabilities in Advanced Reasoning Models

Authors: Arjun Krishna, Aaditya Rastogi, Erick Galinkin | Published: 2025-06-16
Prompt Injection
Large Language Model
Adversarial Attack Methods

TokenBreak: Bypassing Text Classification Models Through Token Manipulation

Authors: Kasimir Schulz, Kenneth Yeung, Kieran Evans | Published: 2025-06-09
Adversarial Attack Methods
Defense Method

Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability

Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09
Certified Robustness
Robust Optimization
Adversarial Attack Methods

A Review of Adversarial Attacks in Computer Vision

Authors: Yutong Zhang, Yao Li, Yin Li, Zhichang Guo | Published: 2023-08-15
Poisoning
Adversarial Attack Methods
Defense Method

Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning

Authors: Simon Queyrut, Yérom-David Bromberg, Valerio Schiavoni | Published: 2023-08-08
Watermarking
Adversarial Attack Methods
Defense Method

A reading survey on adversarial machine learning: Adversarial attacks and their understanding

Authors: Shashank Kotyan | Published: 2023-08-07
Adversarial Example
Adversarial Attack Methods
Defense Method

Label Inference Attacks against Node-level Vertical Federated GNNs

Authors: Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu | Published: 2023-08-04 | Updated: 2024-04-18
Poisoning
Adversarial Attack Methods
Federated Learning

Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples

Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20
Backdoor Attack
Adversarial Attack Methods
Watermark Evaluation

Jailbroken: How Does LLM Safety Training Fail?

Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05
Security Assurance
Prompt Injection
Adversarial Attack Methods

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola | Published: 2023-06-27
Malware Classification
Adversarial Example
Adversarial Attack Methods