Exploring Model Dynamics for Accumulative Poisoning Discovery Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06 Backdoor AttackModel Design and AccuracyAdversarial attack 2023.06.06 2025.05.28 Literature Database
Evading Black-box Classifiers Without Breaking Eggs Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr | Published: 2023-06-05 | Updated: 2024-02-14 Attack EvaluationAdversarial ExampleAdversarial attack 2023.06.05 2025.05.28 Literature Database
Poisoning Network Flow Classifiers Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02 Backdoor AttackPoisoningAdversarial attack 2023.06.02 2025.05.28 Literature Database
A Closer Look at the Adversarial Robustness of Deep Equilibrium Models Authors: Zonghan Yang, Tianyu Pang, Yang Liu | Published: 2023-06-02 Robustness EvaluationAdversarial attackAdaptive Adversarial Training 2023.06.02 2025.05.28 Literature Database
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02 Attack EvaluationAdversarial attackWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01 Adversarial ExampleAdversarial attackWatermark Evaluation 2023.06.01 2025.05.28 Literature Database
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung | Published: 2023-05-31 Backdoor AttackAdversarial attackCausal Discovery Using Missing Data 2023.05.31 2025.05.28 Literature Database
Robust Lipschitz Bandits to Adversarial Corruptions Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2023-05-29 | Updated: 2023-10-08 Reinforcement LearningAdversarial attackMachine Learning Method 2023.05.29 2025.05.28 Literature Database
On Evaluating Adversarial Robustness of Large Vision-Language Models Authors: Yunqing Zhao, Tianyu Pang, Chao Du, Xiao Yang, Chongxuan Li, Ngai-Man Cheung, Min Lin | Published: 2023-05-26 | Updated: 2023-10-29 LLM Performance EvaluationPrompt InjectionAdversarial attack 2023.05.26 2025.05.28 Literature Database
Frequency maps reveal the correlation between Adversarial Attacks and Implicit Bias Authors: Lorenzo Basile, Nikos Karantzas, Alberto d'Onofrio, Luca Manzoni, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi | Published: 2023-05-24 | Updated: 2025-04-08 Adversarial ExampleAdversarial attackDeep Learning Method 2023.05.24 2025.05.28 Literature Database