Adversarial attack

Exploring Model Dynamics for Accumulative Poisoning Discovery

Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06
Backdoor Attack
Model Design and Accuracy
Adversarial attack

Evading Black-box Classifiers Without Breaking Eggs

Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr | Published: 2023-06-05 | Updated: 2024-02-14
Attack Evaluation
Adversarial Example
Adversarial attack

Poisoning Network Flow Classifiers

Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02
Backdoor Attack
Poisoning
Adversarial attack

A Closer Look at the Adversarial Robustness of Deep Equilibrium Models

Authors: Zonghan Yang, Tianyu Pang, Yang Liu | Published: 2023-06-02
Robustness Evaluation
Adversarial attack
Adaptive Adversarial Training

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02
Attack Evaluation
Adversarial attack
Watermark Evaluation

Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach

Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01
Adversarial Example
Adversarial attack
Watermark Evaluation

Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning

Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung | Published: 2023-05-31
Backdoor Attack
Adversarial attack
Causal Discovery Using Missing Data

Robust Lipschitz Bandits to Adversarial Corruptions

Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2023-05-29 | Updated: 2023-10-08
Reinforcement Learning
Adversarial attack
Machine Learning Method

On Evaluating Adversarial Robustness of Large Vision-Language Models

Authors: Yunqing Zhao, Tianyu Pang, Chao Du, Xiao Yang, Chongxuan Li, Ngai-Man Cheung, Min Lin | Published: 2023-05-26 | Updated: 2023-10-29
LLM Performance Evaluation
Prompt Injection
Adversarial attack

Frequency maps reveal the correlation between Adversarial Attacks and Implicit Bias

Authors: Lorenzo Basile, Nikos Karantzas, Alberto d'Onofrio, Luca Manzoni, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi | Published: 2023-05-24 | Updated: 2025-04-08
Adversarial Example
Adversarial attack
Deep Learning Method