Adversarial Robustness for Deep Learning-based Wildfire Prediction Models Dec 28, 2024 Adversarial Attack Adversarial Robustness
— Unverified 0Attribution for Enhanced Explanation with Transferable Adversarial eXploration Dec 27, 2024 Adversarial Attack Diversity
— Unverified 0SurvAttack: Black-Box Attack On Survival Models through Ontology-Informed EHR Perturbation Dec 24, 2024 Adversarial Attack counterfactual
— Unverified 0An Empirical Analysis of Federated Learning Models Subject to Label-Flipping Adversarial Attack Dec 24, 2024 Adversarial Attack Federated Learning
— Unverified 0Robustness-aware Automatic Prompt Optimization Dec 24, 2024 Adversarial Attack
Code Code Available 0Retention Score: Quantifying Jailbreak Risks for Vision Language Models Dec 23, 2024 Adversarial Attack
— Unverified 0ErasableMask: A Robust and Erasable Privacy Protection Scheme against Black-box Face Recognition Models Dec 22, 2024 Adversarial Attack Face Recognition
— Unverified 0Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters Dec 22, 2024 Adversarial Attack Non-Intrusive Load Monitoring
— Unverified 0PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation Dec 21, 2024 Adversarial Attack image-classification
— Unverified 0Adversarial Attack Against Images Classification based on Generative Adversarial Networks Dec 21, 2024 Adversarial Attack Decision Making
— Unverified 0Adversarial Robustness through Dynamic Ensemble Learning Dec 20, 2024 Adversarial Attack Adversarial Robustness
— Unverified 0Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation Dec 20, 2024 Adversarial Attack Diversity
— Unverified 0Adversarially robust generalization theory via Jacobian regularization for deep neural networks Dec 17, 2024 Adversarial Attack
— Unverified 0Unpacking the Resilience of SNLI Contradiction Examples to Attacks Dec 15, 2024 Adversarial Attack
Code Code Available 0RAT: Adversarial Attacks on Deep Reinforcement Agents for Targeted Behaviors Dec 14, 2024 Adversarial Attack Deep Reinforcement Learning
— Unverified 0AHSG: Adversarial Attack on High-level Semantics in Graph Neural Networks Dec 10, 2024 Adversarial Attack Graph Learning
— Unverified 0A Generative Victim Model for Segmentation Dec 10, 2024 Adversarial Attack Image Generation
— Unverified 0Take Fake as Real: Realistic-like Robust Black-box Adversarial Attack to Evade AIGC Detection Dec 9, 2024 Adversarial Attack
— Unverified 0From Flexibility to Manipulation: The Slippery Slope of XAI Evaluation Dec 7, 2024 Adversarial Attack Explainable artificial intelligence
Code Code Available 0Less is More: A Stealthy and Efficient Adversarial Attack Method for DRL-based Autonomous Driving Policies Dec 4, 2024 Adversarial Attack Autonomous Driving
— Unverified 0Does Safety Training of LLMs Generalize to Semantically Related Natural Prompts? Dec 4, 2024 Adversarial Attack
— Unverified 0Multi-Granularity Tibetan Textual Adversarial Attack Method Based on Masked Language Model Dec 3, 2024 Adversarial Attack Hate Speech Detection
Code Code Available 0Pay Attention to the Robustness of Chinese Minority Language Models! Syllable-level Textual Adversarial Attack on Tibetan Script Dec 3, 2024 Adversarial Attack
Code Code Available 0Hijacking Vision-and-Language Navigation Agents with Adversarial Environmental Attacks Dec 3, 2024 Adversarial Attack Vision and Language Navigation
— Unverified 0Intermediate Outputs Are More Sensitive Than You Think Dec 1, 2024 Adversarial Attack Sensitivity
— Unverified 0Fall Leaf Adversarial Attack on Traffic Sign Classification Nov 27, 2024 Adversarial Attack Classification
— Unverified 0Visual Adversarial Attack on Vision-Language Models for Autonomous Driving Nov 27, 2024 Adversarial Attack Autonomous Driving
— Unverified 0Privacy Protection in Personalized Diffusion Models via Targeted Cross-Attention Adversarial Attack Nov 25, 2024 Adversarial Attack
— Unverified 0Scaling Laws for Black box Adversarial Attacks Nov 25, 2024 Adversarial Attack
— Unverified 0Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation Nov 23, 2024 Adversarial Attack Face Recognition
— Unverified 0Evaluating the Robustness of the "Ensemble Everything Everywhere" Defense Nov 22, 2024 Adversarial Attack Robust classification
— Unverified 0NMT-Obfuscator Attack: Ignore a sentence in translation with only one word Nov 19, 2024 Adversarial Attack Adversarial Text
Code Code Available 0DeTrigger: A Gradient-Centric Approach to Backdoor Attack Mitigation in Federated Learning Nov 19, 2024 Adversarial Attack Backdoor Attack
— Unverified 0BEARD: Benchmarking the Adversarial Robustness for Dataset Distillation Nov 14, 2024 Adversarial Attack Adversarial Robustness
Code Code Available 0Robust Optimal Power Flow Against Adversarial Attacks: A Tri-Level Optimization Approach Nov 13, 2024 Adversarial Attack
— Unverified 0Chain Association-based Attacking and Shielding Natural Language Processing Systems Nov 12, 2024 Adversarial Attack
— Unverified 0Neural Fingerprints for Adversarial Attack Detection Nov 7, 2024 Adversarial Attack Adversarial Attack Detection
Code Code Available 0Attention Masks Help Adversarial Attacks to Bypass Safety Detectors Nov 7, 2024 Adversarial Attack image-classification
Code Code Available 0Seeing is Deceiving: Exploitation of Visual Pathways in Multi-Modal Language Models Nov 7, 2024 Adversarial Attack Image Captioning
— Unverified 0Query-Efficient Adversarial Attack Against Vertical Federated Graph Learning Nov 5, 2024 Adversarial Attack Federated Learning
Code Code Available 0LiDAttack: Robust Black-box Attack on LiDAR-based Object Detection Nov 4, 2024 Adversarial Attack object-detection
Code Code Available 0Replace-then-Perturb: Targeted Adversarial Attacks With Visual Reasoning for Vision-Language Models Nov 1, 2024 Adversarial Attack Contrastive Learning
— Unverified 0Pseudo-Conversation Injection for LLM Goal Hijacking Oct 31, 2024 Adversarial Attack
— Unverified 0Keep on Swimming: Real Attackers Only Need Partial Knowledge of a Multi-Model System Oct 30, 2024 Adversarial Attack
— Unverified 0Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers Oct 30, 2024 Adversarial Attack Chatbot
— Unverified 0Evaluating the Robustness of LiDAR Point Cloud Tracking Against Adversarial Attack Oct 28, 2024 3D Object Tracking Adversarial Attack
— Unverified 0Generative Adversarial Patches for Physical Attacks on Cross-Modal Pedestrian Re-Identification Oct 26, 2024 Adversarial Attack
— Unverified 0Adversarial Attacks on Large Language Models Using Regularized Relaxation Oct 24, 2024 Adversarial Attack valid
Code Code Available 0Backdoor in Seconds: Unlocking Vulnerabilities in Large Pre-trained Models via Model Editing Oct 23, 2024 Adversarial Attack Backdoor Attack
— Unverified 0Toward Robust RALMs: Revealing the Impact of Imperfect Retrieval on Retrieval-Augmented Language Models Oct 19, 2024 Adversarial Attack Adversarial Robustness
Code Code Available 0