敵対的サンプル

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay | Published: 2024-02-19
モデル抽出攻撃
分類パターン分析
敵対的サンプル

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics

Authors: Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu | Published: 2024-02-14
敵対的サンプル
敵対的スペクトル攻撃検出
敵対的攻撃検出

PAC-Bayesian Adversarially Robust Generalization Bounds for Graph Neural Network

Authors: Tan Sun, Junhong Lin | Published: 2024-02-06 | Updated: 2024-07-06
GNN
敵対的サンプル
透かし評価

A Training Rate and Survival Heuristic for Inference and Robustness Evaluation (TRASHFIRE)

Authors: Charles Meyers, Mohammad Reza Saleh Sedghpour, Tommy Löfstedt, Erik Elmroth | Published: 2024-01-24 | Updated: 2024-09-11
ハイパーパラメータ調整
モデル性能評価
敵対的サンプル

Defenses in Adversarial Machine Learning: A Survey

Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13
ポイズニング
敵対的サンプル
防御手法

SoK: Unintended Interactions among Machine Learning Defenses and Risks

Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan | Published: 2023-12-07 | Updated: 2024-04-04
ウォーターマーキング
敵対的サンプル
過剰適合と記憶化

Poisoning Retrieval Corpora by Injecting Adversarial Passages

Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29
RAGへのポイズニング攻撃
ポイズニング
敵対的サンプル

Instability of computer vision models is a necessary result of the task itself

Authors: Oliver Turnbull, George Cevora | Published: 2023-10-26
ロバスト性に関する評価
敵対的サンプル
次元削減手法

Attack Prompt Generation for Red Teaming and Defending Large Language Models

Authors: Boyi Deng, Wenjie Wang, Fuli Feng, Yang Deng, Qifan Wang, Xiangnan He | Published: 2023-10-19
プロンプトインジェクション
攻撃の評価
敵対的サンプル

The Efficacy of Transformer-based Adversarial Attacks in Security Domains

Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17
セキュリティ分析
モデル設計
敵対的サンプル