Infighting in the Dark: Multi-Label Backdoor Attack in Federated Learning Authors: Ye Li, Yanchao Zhao, Chengcheng Zhu, Jiale Zhang | Published: 2024-09-29 | Updated: 2025-03-22 ID Mapping ConstructionBackdoor DetectionAdversarial attack 2024.09.29 2025.05.27 Literature Database
Operationalizing a Threat Model for Red-Teaming Large Language Models (LLMs) Authors: Apurv Verma, Satyapriya Krishna, Sebastian Gehrmann, Madhavan Seshadri, Anu Pradhan, Tom Ault, Leslie Barrett, David Rabinowitz, John Doucette, NhatHai Phan | Published: 2024-07-20 | Updated: 2025-07-10 Prompt InjectionPrompt validationAdversarial attack 2024.07.20 2025.07.12 Literature Database
Data Reconstruction Attacks and Defenses: A Systematic Evaluation Authors: Sheng Liu, Zihan Wang, Yuxiao Chen, Qi Lei | Published: 2024-02-13 | Updated: 2025-03-22 Privacy AnalysisModel RobustnessAdversarial attack 2024.02.13 2025.05.27 Literature Database
Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors Authors: Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong | Published: 2024-01-19 PoisoningModel InterpretabilityAdversarial attack 2024.01.19 2025.05.27 Literature Database
PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks Authors: Ping Guo, Zhiyuan Yang, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-19 WatermarkingAdversarial attackDefense Method 2024.01.19 2025.05.27 Literature Database
A provable initialization and robust clustering method for general mixture models Authors: Soham Jana, Jianqing Fan, Sanjeev Kulkarni | Published: 2024-01-10 | Updated: 2024-10-23 Clustering methodsRobustness EvaluationAdversarial attack 2024.01.10 2025.05.27 Literature Database
Evasive Hardware Trojan through Adversarial Power Trace Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani | Published: 2024-01-04 WatermarkingAdversarial attackWatermark Robustness 2024.01.04 2025.05.27 Literature Database
Attack Tree Analysis for Adversarial Evasion Attacks Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28 PoisoningAdversarial attackWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11 PoisoningRobustness EvaluationAdversarial attack 2023.12.11 2025.05.28 Literature Database
Model Extraction Attacks Revisited Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08 Cyber AttackModel Extraction AttackAdversarial attack 2023.12.08 2025.05.28 Literature Database