Defenses in Adversarial Machine Learning: A Survey Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13 PoisoningAdversarial ExampleDefense Method 2023.12.13 2025.05.27 Literature Database
Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks Authors: Xiaobei Yan, Chip Hong Chang, Tianwei Zhang | Published: 2023-12-07 WatermarkingDefense Method 2023.12.07 2025.05.28 Literature Database
Transfer Attacks and Defenses for Large Language Models on Coding Tasks Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu | Published: 2023-11-22 Prompt InjectionAdversarial attackDefense Method 2023.11.22 2025.05.28 Literature Database
Adversarial Purification for Data-Driven Power System Event Classifiers with Diffusion Models Authors: Yuanbin Cheng, Koji Yamashita, Jim Follum, Nanpeng Yu | Published: 2023-11-13 Adversarial Text PurificationOptimization ProblemDefense Method 2023.11.13 2025.05.28 Literature Database
Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11 Improvement of LearningDeep Learning MethodDefense Method 2023.11.11 2025.05.28 Literature Database
Does Differential Privacy Prevent Backdoor Attacks in Practice? Authors: Fereshteh Razmi, Jian Lou, Li Xiong | Published: 2023-11-10 Data Privacy AssessmentTrade-off AnalysisDefense Method 2023.11.10 2025.05.28 Literature Database
Input Reconstruction Attack against Vertical Federated Large Language Models Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24 Characteristics of VFLPrivacy ProtectionDefense Method 2023.11.07 2025.05.28 Literature Database
PubDef: Defending Against Transfer Attacks From Public Models Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17 Adversarial attackAdversarial TrainingDefense Method 2023.10.26 2025.05.28 Literature Database
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18 Privacy Protection MethodPrivacy TechniqueDefense Method 2023.10.18 2025.05.28 Literature Database
Assessing Robustness via Score-Based Adversarial Image Generation Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06 Data GenerationExperimental ValidationDefense Method 2023.10.06 2025.05.28 Literature Database