Autonomous LLM-Enhanced Adversarial Attack for Text-to-Motion Aug 1, 2024 Adversarial Attack Adversarial Text
— Unverified 0Securing the Diagnosis of Medical Imaging: An In-depth Analysis of AI-Resistant Attacks Aug 1, 2024 Adversarial Attack Medical Image Analysis
— Unverified 0OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack Aug 1, 2024 Adversarial Attack Adversarial Defense
— Unverified 0Vulnerabilities in AI-generated Image Detection: The Challenge of Adversarial Attacks Jul 30, 2024 Adversarial Attack Adversarial Robustness
— Unverified 0Physical Adversarial Attack on Monocular Depth Estimation via Shape-Varying Patches Jul 24, 2024 Adversarial Attack Autonomous Driving
— Unverified 0Beyond Dropout: Robust Convolutional Neural Networks Based on Local Feature Masking Jul 18, 2024 Adversarial Attack Adversarial Robustness
— Unverified 0Cross-Task Attack: A Self-Supervision Generative Framework Based on Attention Shift Jul 18, 2024 Adversarial Attack
— Unverified 0Compressed models are NOT miniature versions of large models Jul 18, 2024 Adversarial Attack Model Compression
— Unverified 0Any Target Can be Offense: Adversarial Example Generation via Generalized Latent Infection Jul 17, 2024 Adversarial Attack
Code Code Available 0AEMIM: Adversarial Examples Meet Masked Image Modeling Jul 16, 2024 Adversarial Attack Representation Learning
— Unverified 0Enhancing TinyML Security: Study of Adversarial Attack Transferability Jul 16, 2024 Adversarial Attack Edge-computing
— Unverified 0Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis Jul 16, 2024 Adversarial Attack
Code Code Available 0Wicked Oddities: Selectively Poisoning for Effective Clean-Label Backdoor Attacks Jul 15, 2024 Adversarial Attack Face Recognition
— Unverified 0Transferable 3D Adversarial Shape Completion using Diffusion Models Jul 14, 2024 3D Point Cloud Classification Adversarial Attack
Code Code Available 0SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images Jul 13, 2024 Adversarial Attack
— Unverified 0Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems Jul 11, 2024 Adversarial Attack Face Recognition
Code Code Available 0DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques Jul 9, 2024 Adversarial Attack Image Manipulation
— Unverified 0Rethinking Targeted Adversarial Attacks For Neural Machine Translation Jul 7, 2024 Adversarial Attack Machine Translation
Code Code Available 0Self-Supervised Representation Learning for Adversarial Attack Detection Jul 5, 2024 Adversarial Attack Adversarial Attack Detection
— Unverified 0TrackPGD: Efficient Adversarial Attack using Object Binary Masks against Robust Transformer Trackers Jul 4, 2024 Adversarial Attack Adversarial Robustness
Code Code Available 0JailbreakHunter: A Visual Analytics Approach for Jailbreak Prompts Discovery from Large-Scale Human-LLM Conversational Datasets Jul 3, 2024 Adversarial Attack Semantic Similarity
— Unverified 0L_p-norm Distortion-Efficient Adversarial Attack Jul 3, 2024 Adversarial Attack Adversarial Defense
— Unverified 0Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability Jul 2, 2024 Adversarial Attack
— Unverified 0EvolBA: Evolutionary Boundary Attack under Hard-label Black Box condition Jul 2, 2024 Adversarial Attack
— Unverified 0Query-Efficient Hard-Label Black-Box Attack against Vision Transformers Jun 29, 2024 Adversarial Attack
— Unverified 0Emotion Loss Attacking: Adversarial Attack Perception for Skeleton based on Multi-dimensional Features Jun 28, 2024 Adversarial Attack
— Unverified 0IDT: Dual-Task Adversarial Attacks for Privacy Protection Jun 28, 2024 Adversarial Attack Attribute
— Unverified 0Deceptive Diffusion: Generating Synthetic Adversarial Examples Jun 28, 2024 Adversarial Attack
— Unverified 0CuDA2: An approach for Incorporating Traitor Agents into Cooperative Multi-Agent Systems Jun 25, 2024 Adversarial Attack Multi-agent Reinforcement Learning
— Unverified 0UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification Jun 24, 2024 Adversarial Attack Classification
— Unverified 0The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI Jun 22, 2024 Adversarial Attack
— Unverified 0GraphMU: Repairing Robustness of Graph Neural Networks via Machine Unlearning Jun 19, 2024 Adversarial Attack Adversarial Defense
— Unverified 0AGSOA:Graph Neural Network Targeted Attack Based on Average Gradient and Structure Optimization Jun 19, 2024 Adversarial Attack
— Unverified 0Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation Jun 18, 2024 Adversarial Attack Semantic Similarity
— Unverified 0Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks Jun 18, 2024 Adversarial Attack Intrusion Detection
Code Code Available 0Imperceptible Face Forgery Attack via Adversarial Semantic Mask Jun 16, 2024 Adversarial Attack
Code Code Available 0KGPA: Robustness Evaluation for Large Language Models via Cross-Domain Knowledge Graphs Jun 16, 2024 Adversarial Attack Adversarial Robustness
Code Code Available 0Explainable Graph Neural Networks Under Fire Jun 10, 2024 Adversarial Attack
Code Code Available 0DMS: Addressing Information Loss with More Steps for Pragmatic Adversarial Attacks Jun 9, 2024 Adversarial Attack
— Unverified 0SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner Jun 8, 2024 Adversarial Attack LLM Jailbreak
— Unverified 0VQUNet: Vector Quantization U-Net for Defending Adversarial Atacks by Regularizing Unwanted Noise Jun 5, 2024 Adversarial Attack Quantization
— Unverified 0Graph Neural Network Explanations are Fragile Jun 5, 2024 Adversarial Attack Graph Neural Network
Code Code Available 0SVASTIN: Sparse Video Adversarial Attack via Spatio-Temporal Invertible Neural Networks Jun 4, 2024 Adversarial Attack
Code Code Available 0Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior May 29, 2024 Adversarial Attack Bayesian Optimization
Code Code Available 0Wavelet-Based Image Tokenizer for Vision Transformers May 28, 2024 Adversarial Attack
— Unverified 0Uncertainty Measurement of Deep Learning System based on the Convex Hull of Training Sets May 25, 2024 Adversarial Attack
— Unverified 0Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack May 25, 2024 Adversarial Attack backdoor defense
— Unverified 0Rethinking Independent Cross-Entropy Loss For Graph-Structured Data May 24, 2024 Adversarial Attack Node Classification
Code Code Available 0Adversarial Attacks on Hidden Tasks in Multi-Task Learning May 24, 2024 Adversarial Attack Multi-Task Learning
— Unverified 0AdjointDEIS: Efficient Gradients for Diffusion Models May 23, 2024 Adversarial Attack
Code Code Available 0