Adversarial Attack Detection

Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework

Authors: Xia Du, Xiaoyuan Liu, Jizhe Zhou, Zheng Lin, Chi-man Pun, Zhe Chen, Wei Ni, Jun Luo | Published: 2025-06-12
Certified Robustness
Adversarial Learning
Adversarial Attack Detection

Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks

Authors: Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou | Published: 2024-06-18 | Updated: 2025-04-14
Certified Robustness
Reconstruction Attack
Adversarial Attack Detection

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics

Authors: Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu | Published: 2024-02-14
Adversarial Example
Adversarial Spectrum Attack Detection
Adversarial Attack Detection

Agent Smith: A Single Image Can Jailbreak One Million Multimodal LLM Agents Exponentially Fast

Authors: Xiangming Gu, Xiaosen Zheng, Tianyu Pang, Chao Du, Qian Liu, Ye Wang, Jing Jiang, Min Lin | Published: 2024-02-13 | Updated: 2024-06-03
LLM Security
Prompt Injection
Adversarial Attack Detection

System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks

Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13
O-RAN Security
Cyber Attack
Adversarial Attack Detection

Comparing Spectral Bias and Robustness For Two-Layer Neural Networks: SGD vs Adaptive Random Fourier Features

Authors: Aku Kammonen, Lisi Liang, Anamika Pandey, Raúl Tempone | Published: 2024-02-01
Watermarking
Bias
Adversarial Attack Detection

Sparse and Transferable Universal Singular Vectors Attack

Authors: Kseniia Kuvshinova, Olga Tsymboi, Ivan Oseledets | Published: 2024-01-25
Watermarking
Adversarial Attack Detection
Optimization Methods

A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework

Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26
Security Analysis
Model Design
Adversarial Attack Detection

Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks

Authors: Xinglong Chang, Katharina Dost, Gillian Dobbie, Jörg Wicker | Published: 2023-10-24
Data Generation
Poisoning
Adversarial Attack Detection

On the Detection of Image-Scaling Attacks in Machine Learning

Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23
Backdoor Attack
Adversarial Attack Detection
Analysis of Detection Methods