敵対的サンプルの脆弱性

Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack

Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27
RAG
RAGへのポイズニング攻撃
敵対的サンプルの脆弱性

Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent

Authors: Philip Doldo, Derek Everett, Amol Khanna, Andre T Nguyen, Edward Raff | Published: 2025-03-25
敵対的サンプルの脆弱性
敵対的学習
深層ネットワークの堅牢性

BounTCHA: A CAPTCHA Utilizing Boundary Identification in Guided Generative AI-extended Videos

Authors: Lehao Lin, Ke Wang, Maha Abdallah, Wei Cai | Published: 2025-01-30 | Updated: 2025-04-01
CAPTCHA
動画信頼性確保
敵対的サンプルの脆弱性

CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers

Authors: Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He | Published: 2024-12-26 | Updated: 2025-03-31
LLMセキュリティ
バックドア攻撃
敵対的サンプルの脆弱性

LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples

Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04
ハルシネーション
敵対的サンプルの脆弱性
敵対的学習

Hack The Box: Fooling Deep Learning Abstraction-Based Monitors

Authors: Sara Hajj Ibrahim, Mohamed Nassar | Published: 2021-07-10 | Updated: 2021-07-18
攻撃シナリオ分析
敵対的サンプル
敵対的サンプルの脆弱性

Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning

Authors: Matthew Watson, Noura Al Moubayed | Published: 2021-05-05
医療画像分析
敵対的サンプルの脆弱性
敵対的攻撃

An Overview of Laser Injection against Embedded Neural Network Models

Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04
ハードウェアセキュリティ
敵対的サンプルの脆弱性
脆弱性分析

Who’s Afraid of Adversarial Transferability?

Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06
敵対的サンプル
敵対的サンプルの脆弱性
脆弱性分析

Adversarial Attacks and Defenses for Speech Recognition Systems

Authors: Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur | Published: 2021-03-31
敵対的サンプルの脆弱性
文献リスト
防御メカニズム