Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework Authors: Xia Du, Xiaoyuan Liu, Jizhe Zhou, Zheng Lin, Chi-man Pun, Zhe Chen, Wei Ni, Jun Luo | Published: 2025-06-12 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2025.06.12 2025.06.14 Literature Database
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks Authors: Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou | Published: 2024-06-18 | Updated: 2025-04-14 Certified RobustnessReconstruction AttackAdversarial Attack Detection 2024.06.18 2025.05.27 Literature Database
Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics Authors: Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu | Published: 2024-02-14 Adversarial ExampleAdversarial Spectrum Attack DetectionAdversarial Attack Detection 2024.02.14 2025.05.27 Literature Database
Agent Smith: A Single Image Can Jailbreak One Million Multimodal LLM Agents Exponentially Fast Authors: Xiangming Gu, Xiaosen Zheng, Tianyu Pang, Chao Du, Qian Liu, Ye Wang, Jing Jiang, Min Lin | Published: 2024-02-13 | Updated: 2024-06-03 LLM SecurityPrompt InjectionAdversarial Attack Detection 2024.02.13 2025.05.27 Literature Database
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13 O-RAN SecurityCyber AttackAdversarial Attack Detection 2024.02.10 2025.05.27 Literature Database
Comparing Spectral Bias and Robustness For Two-Layer Neural Networks: SGD vs Adaptive Random Fourier Features Authors: Aku Kammonen, Lisi Liang, Anamika Pandey, Raúl Tempone | Published: 2024-02-01 WatermarkingBiasAdversarial Attack Detection 2024.02.01 2025.05.27 Literature Database
Sparse and Transferable Universal Singular Vectors Attack Authors: Kseniia Kuvshinova, Olga Tsymboi, Ivan Oseledets | Published: 2024-01-25 WatermarkingAdversarial Attack DetectionOptimization Methods 2024.01.25 2025.05.27 Literature Database
A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26 Security AnalysisModel DesignAdversarial Attack Detection 2023.10.26 2025.05.28 Literature Database
Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks Authors: Xinglong Chang, Katharina Dost, Gillian Dobbie, Jörg Wicker | Published: 2023-10-24 Data GenerationPoisoningAdversarial Attack Detection 2023.10.24 2025.05.28 Literature Database
On the Detection of Image-Scaling Attacks in Machine Learning Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23 Backdoor AttackAdversarial Attack DetectionAnalysis of Detection Methods 2023.10.23 2025.05.28 Literature Database