Towards Sybil Resilience in Decentralized Learning Jun 26, 2023 Adversarial Attack Federated Learning
— Unverified 0Cross-lingual Cross-temporal Summarization: Dataset, Models, Evaluation Jun 22, 2023 Adversarial Attack Negation
Code Code Available 0Adversarial Attacks Neutralization via Data Set Randomization Jun 21, 2023 Adversarial Attack
— Unverified 0Physics-constrained Attack against Convolution-based Human Motion Prediction Jun 21, 2023 Adversarial Attack Adversarial Robustness
Code Code Available 0Sample Attackability in Natural Language Adversarial Attacks Jun 21, 2023 Adversarial Attack
Code Code Available 0You Don't Need Robust Machine Learning to Manage Adversarial Attack Risks Jun 16, 2023 Adversarial Attack
— Unverified 0A Relaxed Optimization Approach for Adversarial Attacks against Neural Machine Translation Models Jun 14, 2023 Adversarial Attack Machine Translation
— Unverified 0Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems Jun 13, 2023 Adversarial Attack Face Swapping
Code Code Available 0I See Dead People: Gray-Box Adversarial Attack on Image-To-Text Models Jun 13, 2023 Adversarial Attack Decoder
— Unverified 0Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions Jun 9, 2023 Adversarial Attack Atari Games
— Unverified 0COVER: A Heuristic Greedy Adversarial Attack on Prompt-based Learning in Language Models Jun 9, 2023 Adversarial Attack
— Unverified 0Mitigating Evasion Attacks in Federated Learning-Based Signal Classifiers Jun 8, 2023 Adversarial Attack Federated Learning
— Unverified 0Expanding Scope: Adapting English Adversarial Attacks to Chinese Jun 8, 2023 Adversarial Attack Adversarial Robustness
Code Code Available 0Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning Jun 8, 2023 Adversarial Attack Intrusion Detection
— Unverified 0A Robust Likelihood Model for Novelty Detection Jun 6, 2023 Adversarial Attack Anomaly Detection
— Unverified 0Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach Jun 6, 2023 Adversarial Attack Color Image Denoising
Code Code Available 0KNOW How to Make Up Your Mind! Adversarially Detecting and Alleviating Inconsistencies in Natural Language Explanations Jun 5, 2023 Adversarial Attack
Code Code Available 0Adversarial alignment: Breaking the trade-off between the strength of an attack and its relevance to human perception Jun 5, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy Jun 4, 2023 Adversarial Attack Attribute
— Unverified 0Adversarial Attack Based on Prediction-Correction Jun 2, 2023 Adversarial Attack Prediction
— Unverified 0Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach Jun 1, 2023 Adversarial Attack Adversarial Defense
— Unverified 0Discovering Failure Modes of Text-guided Diffusion Models via Adversarial Search Jun 1, 2023 Adversarial Attack Efficient Exploration
— Unverified 0Graph-based methods coupled with specific distributional distances for adversarial attack detection May 31, 2023 Adversarial Attack Adversarial Attack Detection
Code Code Available 0From Adversarial Arms Race to Model-centric Evaluation: Motivating a Unified Automatic Robustness Evaluation Framework May 29, 2023 Adversarial Attack
Code Code Available 0Modeling Adversarial Attack on Pre-trained Language Models as Sequential Decision Making May 27, 2023 Adversarial Attack Decision Making
Code Code Available 0PEARL: Preprocessing Enhanced Adversarial Robust Learning of Image Deraining for Semantic Segmentation May 25, 2023 Adversarial Attack Rain Removal
— Unverified 0Another Dead End for Morphological Tags? Perturbed Inputs and Parsing May 24, 2023 Adversarial Attack
Code Code Available 0Enhancing Accuracy and Robustness through Adversarial Training in Class Incremental Continual Learning May 23, 2023 Adversarial Attack Continual Learning
— Unverified 0Latent Magic: An Investigation into Adversarial Examples Crafted in the Semantic Latent Space May 22, 2023 Adversarial Attack SSIM
— Unverified 0Attribute-Guided Encryption with Facial Texture Masking May 22, 2023 Adversarial Attack Attribute
— Unverified 0Are Your Explanations Reliable? Investigating the Stability of LIME in Explaining Text Classifiers by Marrying XAI and Adversarial Attack May 21, 2023 Adversarial Attack
Code Code Available 0Dynamic Transformers Provide a False Sense of Efficiency May 20, 2023 Adversarial Attack
Code Code Available 0Spatial-Frequency Discriminability for Revealing Adversarial Perturbations May 18, 2023 Adversarial Attack Blocking
Code Code Available 0Adversarial Amendment is the Only Force Capable of Transforming an Enemy into a Friend May 18, 2023 Adversarial Attack Adversarial Defense
— Unverified 0Content-based Unrestricted Adversarial Attack May 18, 2023 Adversarial Attack
— Unverified 0Iterative Adversarial Attack on Image-guided Story Ending Generation May 16, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0Attacking Perceptual Similarity Metrics May 15, 2023 Adversarial Attack Experimental Design
— Unverified 0A Black-Box Attack on Code Models via Representation Nearest Neighbor Search May 10, 2023 Adversarial Attack Clone Detection
— Unverified 0The Best Defense is Attack: Repairing Semantics in Textual Adversarial Examples May 6, 2023 Adversarial Attack Adversarial Defense
— Unverified 0New Adversarial Image Detection Based on Sentiment Analysis May 3, 2023 Adversarial Attack GPU
Code Code Available 0Boosting Adversarial Transferability via Fusing Logits of Top-1 Decomposed Feature May 2, 2023 Adversarial Attack
Code Code Available 0Attack-SAM: Towards Attacking Segment Anything Model With Adversarial Examples May 1, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0Evaluating Adversarial Robustness on Document Image Classification Apr 24, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0Wavelets Beat Monkeys at Adversarial Robustness Apr 19, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0Towards the Transferable Audio Adversarial Attack via Ensemble Methods Apr 18, 2023 Adversarial Attack Autonomous Driving
— Unverified 0Combining Generators of Adversarial Malware Examples to Increase Evasion Rate Apr 14, 2023 Adversarial Attack
Code Code Available 0RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense Apr 11, 2023 Adversarial Attack Attribute
— Unverified 0Benchmarking the Physical-world Adversarial Robustness of Vehicle Detection Apr 11, 2023 Adversarial Attack Adversarial Robustness
— Unverified 0Fast Adversarial CNN-based Perturbation Attack of No-Reference Image Quality Metrics Apr 11, 2023 Adversarial Attack No-Reference Image Quality Assessment
Code Code Available 0Generating Adversarial Attacks in the Latent Space Apr 10, 2023 Adversarial Attack Generative Adversarial Network
— Unverified 0