Adversarial Demonstration Attacks on Large Language Models Authors: Jiongxiao Wang, Zichen Liu, Keun Hee Park, Zhuojun Jiang, Zhaoheng Zheng, Zhuofeng Wu, Muhao Chen, Chaowei Xiao | Published: 2023-05-24 | Updated: 2023-10-14 Malicious Demo ConstructionAdversarial ExampleAdversarial attack 2023.05.24 2025.05.28 Literature Database
Poisoning Web-Scale Training Datasets is Practical Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06 PoisoningAttack Scenario AnalysisAdversarial attack 2023.02.20 2025.05.28 Literature Database
Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization Authors: Ziquan Liu, Antoni B. Chan | Published: 2022-10-11 PoisoningPerformance Evaluation MetricsAdversarial attack 2022.10.11 2025.05.28 Literature Database
Characterizing Internal Evasion Attacks in Federated Learning Authors: Taejin Kim, Shubhranshu Singh, Nikhil Madaan, Carlee Joe-Wong | Published: 2022-09-17 | Updated: 2023-10-21 PoisoningAdversarial attackAdaptive Adversarial Training 2022.09.17 2025.05.28 Literature Database
Membership Inference Attacks by Exploiting Loss Trajectory Authors: Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang | Published: 2022-08-31 Membership InferenceModel ArchitectureAdversarial attack 2022.08.31 2025.05.28 Literature Database
A Black-Box Attack on Optical Character Recognition Systems Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30 Adversarial ExampleAdversarial attackOptimization Methods 2022.08.30 2025.05.28 Literature Database
Architectural Backdoors in Neural Networks Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15 Adversarial LearningAdversarial attackThreat Model 2022.06.15 2025.05.28 Literature Database
Statically Detecting Adversarial Malware through Randomised Chaining Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Malware Detection MethodAdversarial attackDefense Method 2021.11.28 2025.05.28 Literature Database
Dissecting Malware in the Wild Authors: Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Backdoor AttackMalware Detection MethodAdversarial attack 2021.11.28 2025.05.28 Literature Database
The Geometry of Adversarial Training in Binary Classification Authors: Leon Bungert, Nicolás García Trillos, Ryan Murray | Published: 2021-11-26 | Updated: 2022-08-01 Adversarial attackRegularizationNonlocal Variational Regularization 2021.11.26 2025.05.28 Literature Database