Towards Robust and Secure Embodied AI: A Survey on Vulnerabilities and Attacks Feb 18, 2025 Adversarial Attack Autonomous Vehicles
— Unverified 0PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN Feb 16, 2025 Adversarial Attack regression
— Unverified 0To Think or Not to Think: Exploring the Unthinking Vulnerability in Large Reasoning Models Feb 16, 2025 Adversarial Attack Backdoor Attack
Code Code Available 1ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech Feb 13, 2025 Adversarial Attack Adversarial Attack Detection
— Unverified 0AdvSwap: Covert Adversarial Perturbation with High Frequency Info-swapping for Autonomous Driving Perception Feb 12, 2025 Adversarial Attack Autonomous Driving
— Unverified 0MAA: Meticulous Adversarial Attack against Vision-Language Pre-trained Models Feb 12, 2025 Adversarial Attack
— Unverified 0Universal Adversarial Attack on Aligned Multimodal LLMs Feb 11, 2025 Adversarial Attack
— Unverified 0Democratic Training Against Universal Adversarial Perturbations Feb 8, 2025 Adversarial Attack
— Unverified 0Rigid Body Adversarial Attacks Feb 8, 2025 Adversarial Attack
— Unverified 0BitAbuse: A Dataset of Visually Perturbed Texts for Defending Phishing Attacks Feb 6, 2025 Adversarial Attack
Code Code Available 0MARAGE: Transferable Multi-Model Adversarial Attack for Retrieval-Augmented Generation Data Extraction Feb 5, 2025 Adversarial Attack RAG
— Unverified 0Real-Time Privacy Risk Measurement with Privacy Tokens for Gradient Leakage Feb 5, 2025 Adversarial Attack
— Unverified 0Wolfpack Adversarial Attack for Robust Multi-Agent Reinforcement Learning Feb 5, 2025 Adversarial Attack Multi-agent Reinforcement Learning
Code Code Available 0CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models Feb 4, 2025 Adversarial Attack Diagnostic
— Unverified 0FRAUD-RLA: A new reinforcement learning adversarial attack against credit card fraud detection Feb 4, 2025 Adversarial Attack Fraud Detection
— Unverified 0Refining Adaptive Zeroth-Order Optimization at Ease Feb 3, 2025 Adversarial Attack
— Unverified 0Adversarial Attacks on AI-Generated Text Detection Models: A Token Probability-Based Approach Using Embeddings Jan 31, 2025 Adversarial Attack Text Detection
— Unverified 0Redefining Machine Unlearning: A Conformal Prediction-Motivated Approach Jan 31, 2025 Adversarial Attack Conformal Prediction
— Unverified 0Understanding Oversmoothing in GNNs as Consensus in Opinion Dynamics Jan 31, 2025 Adversarial Attack
— Unverified 0SAeUron: Interpretable Concept Unlearning in Diffusion Models with Sparse Autoencoders Jan 29, 2025 Adversarial Attack Denoising
Code Code Available 2HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns Jan 28, 2025 Adversarial Attack Benchmarking
Code Code Available 1The Relationship Between Network Similarity and Transferability of Adversarial Attacks Jan 27, 2025 Adversarial Attack
— Unverified 0GreedyPixel: Fine-Grained Black-Box Adversarial Attack Via Greedy Algorithm Jan 24, 2025 Adversarial Attack Computational Efficiency
— Unverified 0Device-aware Optical Adversarial Attack for a Portable Projector-camera System Jan 23, 2025 Adversarial Attack Face Recognition
— Unverified 0Black-Box Adversarial Attack on Vision Language Models for Autonomous Driving Jan 23, 2025 Adversarial Attack Autonomous Driving
— Unverified 0Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks Jan 21, 2025 Adversarial Attack All
— Unverified 0Robustness of Selected Learning Models under Label-Flipping Attack Jan 21, 2025 Adversarial Attack
— Unverified 0Enhancing Adversarial Transferability via Component-Wise Transformation Jan 21, 2025 Adversarial Attack
— Unverified 0Differentiable Adversarial Attacks for Marked Temporal Point Processes Jan 17, 2025 Adversarial Attack Point Processes
Code Code Available 0Salient Information Preserving Adversarial Training Improves Clean and Robust Accuracy Jan 15, 2025 Adversarial Attack
— Unverified 0MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework Jan 13, 2025 Adversarial Attack
— Unverified 0Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities Jan 13, 2025 Adversarial Attack
— Unverified 0Effective faking of verbal deception detection with target-aligned adversarial attacks Jan 10, 2025 Adversarial Attack Deception Detection
— Unverified 0Enforcing Fundamental Relations via Adversarial Attacks on Input Parameter Correlations Jan 9, 2025 Activity Recognition Adversarial Attack
— Unverified 0Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective Jan 7, 2025 Adversarial Attack Deep Reinforcement Learning
— Unverified 0FlippedRAG: Black-Box Opinion Manipulation Adversarial Attacks to Retrieval-Augmented Generation Models Jan 6, 2025 Adversarial Attack Hallucination
— Unverified 0Distillation-Enhanced Physical Adversarial Attacks Jan 4, 2025 Adversarial Attack Knowledge Distillation
— Unverified 0Adaptive Meta-learning-based Adversarial Training for Robust Automatic Modulation Classification Jan 3, 2025 Adversarial Attack Meta-Learning
— Unverified 0AVTrustBench: Assessing and Enhancing Reliability and Robustness in Audio-Visual LLMs Jan 3, 2025 Adversarial Attack Diagnostic
— Unverified 0Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs Jan 2, 2025 Adversarial Attack Attribute
— Unverified 0Enhancing Adversarial Transferability with Checkpoints of a Single Model's Training Jan 1, 2025 Adversarial Attack Diversity
— Unverified 0I2VGuard: Safeguarding Images against Misuse in Diffusion-based Image-to-Video Models Jan 1, 2025 Adversarial Attack Image to Video Generation
— Unverified 0Advancing Adversarial Robustness in GNeRFs: The IL2-NeRF Attack Jan 1, 2025 3D Reconstruction Adversarial Attack
Code Code Available 0Prompt2Perturb (P2P): Text-Guided Diffusion-Based Adversarial Attack on Breast Ultrasound Images Jan 1, 2025 Adversarial Attack Prompt Learning
— Unverified 0ProjAttacker: A Configurable Physical Adversarial Attack for Face Recognition via Projector Jan 1, 2025 Adversarial Attack Face Recognition
— Unverified 0Adversarial Attack and Defense for LoRa Device Identification and Authentication via Deep Learning Dec 30, 2024 Adversarial Attack Density Estimation
— Unverified 0Adversarial Robustness for Deep Learning-based Wildfire Prediction Models Dec 28, 2024 Adversarial Attack Adversarial Robustness
— Unverified 0Attribution for Enhanced Explanation with Transferable Adversarial eXploration Dec 27, 2024 Adversarial Attack Diversity
— Unverified 0Robustness-aware Automatic Prompt Optimization Dec 24, 2024 Adversarial Attack
Code Code Available 0An Empirical Analysis of Federated Learning Models Subject to Label-Flipping Adversarial Attack Dec 24, 2024 Adversarial Attack Federated Learning
— Unverified 0