Weakest Link in the Chain: Security Vulnerabilities in Advanced Reasoning Models Authors: Arjun Krishna, Aaditya Rastogi, Erick Galinkin | Published: 2025-06-16 Prompt InjectionLarge Language ModelAdversarial Attack Methods 2025.06.16 2025.06.18 Literature Database
TokenBreak: Bypassing Text Classification Models Through Token Manipulation Authors: Kasimir Schulz, Kenneth Yeung, Kieran Evans | Published: 2025-06-09 Adversarial Attack MethodsDefense Method 2025.06.09 2025.06.11 Literature Database
Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09 Certified RobustnessRobust OptimizationAdversarial Attack Methods 2025.06.09 2025.06.11 Literature Database
A Review of Adversarial Attacks in Computer Vision Authors: Yutong Zhang, Yao Li, Yin Li, Zhichang Guo | Published: 2023-08-15 PoisoningAdversarial Attack MethodsDefense Method 2023.08.15 2025.05.28 Literature Database
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning Authors: Simon Queyrut, Yérom-David Bromberg, Valerio Schiavoni | Published: 2023-08-08 WatermarkingAdversarial Attack MethodsDefense Method 2023.08.08 2025.05.28 Literature Database
A reading survey on adversarial machine learning: Adversarial attacks and their understanding Authors: Shashank Kotyan | Published: 2023-08-07 Adversarial ExampleAdversarial Attack MethodsDefense Method 2023.08.07 2025.05.28 Literature Database
Label Inference Attacks against Node-level Vertical Federated GNNs Authors: Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu | Published: 2023-08-04 | Updated: 2024-04-18 PoisoningAdversarial Attack MethodsFederated Learning 2023.08.04 2025.05.28 Literature Database
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20 Backdoor AttackAdversarial Attack MethodsWatermark Evaluation 2023.07.20 2025.05.28 Literature Database
Jailbroken: How Does LLM Safety Training Fail? Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05 Security AssurancePrompt InjectionAdversarial Attack Methods 2023.07.05 2025.05.28 Literature Database
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola | Published: 2023-06-27 Malware ClassificationAdversarial ExampleAdversarial Attack Methods 2023.06.27 2025.05.28 Literature Database