Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20 Backdoor AttackAdversarial Attack MethodsWatermark Evaluation 2023.07.20 2025.05.28 Literature Database
Jailbroken: How Does LLM Safety Training Fail? Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05 Security AssurancePrompt InjectionAdversarial Attack Methods 2023.07.05 2025.05.28 Literature Database
Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola | Published: 2023-06-27 Malware ClassificationAdversarial ExampleAdversarial Attack Methods 2023.06.27 2025.05.28 Literature Database
Are aligned neural networks adversarially aligned? Authors: Nicholas Carlini, Milad Nasr, Christopher A. Choquette-Choo, Matthew Jagielski, Irena Gao, Anas Awadalla, Pang Wei Koh, Daphne Ippolito, Katherine Lee, Florian Tramer, Ludwig Schmidt | Published: 2023-06-26 | Updated: 2024-05-06 Prompt InjectionAdversarial ExampleAdversarial Attack Methods 2023.06.26 2025.05.28 Literature Database
On the Resilience of Machine Learning-Based IDS for Automotive Networks Authors: Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, Shahid Raza | Published: 2023-06-26 Malware Detection MethodAdversarial Attack MethodsVehicle Network 2023.06.26 2025.05.28 Literature Database
Adversarial Robustness in Unsupervised Machine Learning: A Systematic Review Authors: Mathias Lundteigen Mohus, Jinyue Li | Published: 2023-06-01 Privacy Protection MethodPoisoningAdversarial Attack Methods 2023.06.01 2025.05.28 Literature Database
Constructing Semantics-Aware Adversarial Examples with a Probabilistic Perspective Authors: Andi Zhang, Mingtian Zhang, Damon Wischik | Published: 2023-06-01 | Updated: 2024-11-24 PoisoningDiffusion ModelAdversarial Attack Methods 2023.06.01 2025.05.28 Literature Database
Verifiable Learning for Robust Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza | Published: 2023-05-05 | Updated: 2023-11-11 Random ForestAdversarial Attack MethodsDecision Tree 2023.05.05 2025.05.28 Literature Database
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30 CybersecurityAdversarial Attack MethodsOperational Scenario 2023.04.30 2025.05.28 Literature Database
SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11 DNN IP Protection MethodAdversarial Attack MethodsStructural Attack 2023.01.11 2025.05.28 Literature Database