敵対的訓練

Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks

Authors: Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh | Published: 2023-10-16
プロンプトインジェクション
敵対的サンプル
敵対的訓練

Regularization properties of adversarially-trained linear regression

Authors: Antônio H. Ribeiro, Dave Zachariah, Francis Bach, Thomas B. Schön | Published: 2023-10-16
収束特性
損失項
敵対的訓練

How Robust is Google’s Bard to Adversarial Image Attacks?

Authors: Yinpeng Dong, Huanran Chen, Jiawei Chen, Zhengwei Fang, Xiao Yang, Yichi Zhang, Yu Tian, Hang Su, Jun Zhu | Published: 2023-09-21 | Updated: 2023-10-14
敵対的訓練
防御手法
顔認識

Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review

Authors: Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen | Published: 2023-08-30 | Updated: 2023-12-25
エネルギー管理
プロンプトインジェクション
敵対的訓練

Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification

Authors: Atefeh Mahdavi, Neda Keivandarian, Marco Carvalho | Published: 2023-08-29
テキスト生成手法
敵対的訓練
適応型誤用検出

SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection

Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13
バックドア攻撃
敵対的訓練
防御手法

Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions

Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09
攻撃手法
敵対的訓練
行動解析手法

Isometric 3D Adversarial Examples in the Physical World

Authors: Yibo Miao, Yinpeng Dong, Jun Zhu, Xiao-Shan Gao | Published: 2022-10-27
敵対的訓練
最適化手法
生成的敵対ネットワーク

Multi-view Representation Learning from Malware to Defend Against Adversarial Variants

Authors: James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen | Published: 2022-10-25
ウォーターマーキング
動的分析
敵対的訓練

A White-Box Adversarial Attack Against a Digital Twin

Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25
サイバー攻撃
敵対的訓練
異常検出手法