Robust Active Learning (RoAL): Countering Dynamic Adversaries in Active Learning with Elastic Weight Consolidation Aug 14, 2024 Active Learning Adversarial Attack
— Unverified 0Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack Aug 14, 2024 Adversarial Attack
— Unverified 0ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack Aug 10, 2024 Adversarial Attack Denoising
— Unverified 0Ensemble everything everywhere: Multi-scale aggregation for adversarial robustness Aug 8, 2024 Adversarial Attack Adversarial Robustness
Code Code Available 1Improving Network Interpretability via Explanation Consistency Evaluation Aug 8, 2024 Adversarial Attack
— Unverified 0Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis Aug 6, 2024 Adversarial Attack feature selection
— Unverified 0Guardians of Image Quality: Benchmarking Defenses Against Adversarial Attacks on Image Quality Metrics Aug 2, 2024 Adversarial Attack Adversarial Purification
Code Code Available 1Securing the Diagnosis of Medical Imaging: An In-depth Analysis of AI-Resistant Attacks Aug 1, 2024 Adversarial Attack Medical Image Analysis
— Unverified 0OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack Aug 1, 2024 Adversarial Attack Adversarial Defense
— Unverified 0Autonomous LLM-Enhanced Adversarial Attack for Text-to-Motion Aug 1, 2024 Adversarial Attack Adversarial Text
— Unverified 0Vulnerabilities in AI-generated Image Detection: The Challenge of Adversarial Attacks Jul 30, 2024 Adversarial Attack Adversarial Robustness
— Unverified 0EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection Jul 27, 2024 Adversarial Attack Vulnerability Detection
Code Code Available 1Physical Adversarial Attack on Monocular Depth Estimation via Shape-Varying Patches Jul 24, 2024 Adversarial Attack Autonomous Driving
— Unverified 0Compressed models are NOT miniature versions of large models Jul 18, 2024 Adversarial Attack Model Compression
— Unverified 0Beyond Dropout: Robust Convolutional Neural Networks Based on Local Feature Masking Jul 18, 2024 Adversarial Attack Adversarial Robustness
— Unverified 0PG-Attack: A Precision-Guided Adversarial Attack Framework Against Vision Foundation Models for Autonomous Driving Jul 18, 2024 Adversarial Attack Autonomous Driving
Code Code Available 1Cross-Task Attack: A Self-Supervision Generative Framework Based on Attention Shift Jul 18, 2024 Adversarial Attack
— Unverified 0Any Target Can be Offense: Adversarial Example Generation via Generalized Latent Infection Jul 17, 2024 Adversarial Attack
Code Code Available 0AEMIM: Adversarial Examples Meet Masked Image Modeling Jul 16, 2024 Adversarial Attack Representation Learning
— Unverified 0Enhancing TinyML Security: Study of Adversarial Attack Transferability Jul 16, 2024 Adversarial Attack Edge-computing
— Unverified 0Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis Jul 16, 2024 Adversarial Attack
Code Code Available 0Wicked Oddities: Selectively Poisoning for Effective Clean-Label Backdoor Attacks Jul 15, 2024 Adversarial Attack Face Recognition
— Unverified 0Transferable 3D Adversarial Shape Completion using Diffusion Models Jul 14, 2024 3D Point Cloud Classification Adversarial Attack
Code Code Available 0SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images Jul 13, 2024 Adversarial Attack
— Unverified 0Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems Jul 11, 2024 Adversarial Attack Face Recognition
Code Code Available 0Adversarial Attacks and Defenses on Text-to-Image Diffusion Models: A Survey Jul 10, 2024 Adversarial Attack Image Generation
Code Code Available 2DLOVE: A new Security Evaluation Tool for Deep Learning Based Watermarking Techniques Jul 9, 2024 Adversarial Attack Image Manipulation
— Unverified 0Rethinking Targeted Adversarial Attacks For Neural Machine Translation Jul 7, 2024 Adversarial Attack Machine Translation
Code Code Available 0Controlling Whisper: Universal Acoustic Adversarial Attacks to Control Speech Foundation Models Jul 5, 2024 Adversarial Attack Automatic Speech Recognition
Code Code Available 1Self-Supervised Representation Learning for Adversarial Attack Detection Jul 5, 2024 Adversarial Attack Adversarial Attack Detection
— Unverified 0TrackPGD: Efficient Adversarial Attack using Object Binary Masks against Robust Transformer Trackers Jul 4, 2024 Adversarial Attack Adversarial Robustness
Code Code Available 0JailbreakHunter: A Visual Analytics Approach for Jailbreak Prompts Discovery from Large-Scale Human-LLM Conversational Datasets Jul 3, 2024 Adversarial Attack Semantic Similarity
— Unverified 0L_p-norm Distortion-Efficient Adversarial Attack Jul 3, 2024 Adversarial Attack Adversarial Defense
— Unverified 0Adversarial Magnification to Deceive Deepfake Detection through Super Resolution Jul 2, 2024 Adversarial Attack DeepFake Detection
Code Code Available 1EvolBA: Evolutionary Boundary Attack under Hard-label Black Box condition Jul 2, 2024 Adversarial Attack
— Unverified 0Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability Jul 2, 2024 Adversarial Attack
— Unverified 0Query-Efficient Hard-Label Black-Box Attack against Vision Transformers Jun 29, 2024 Adversarial Attack
— Unverified 0Emotion Loss Attacking: Adversarial Attack Perception for Skeleton based on Multi-dimensional Features Jun 28, 2024 Adversarial Attack
— Unverified 0Deceptive Diffusion: Generating Synthetic Adversarial Examples Jun 28, 2024 Adversarial Attack
— Unverified 0IDT: Dual-Task Adversarial Attacks for Privacy Protection Jun 28, 2024 Adversarial Attack Attribute
— Unverified 0On Discrete Prompt Optimization for Diffusion Models Jun 27, 2024 Adversarial Attack Prompt Engineering
Code Code Available 2CuDA2: An approach for Incorporating Traitor Agents into Cooperative Multi-Agent Systems Jun 25, 2024 Adversarial Attack Multi-agent Reinforcement Learning
— Unverified 0UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification Jun 24, 2024 Adversarial Attack Classification
— Unverified 0The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI Jun 22, 2024 Adversarial Attack
— Unverified 0GraphMU: Repairing Robustness of Graph Neural Networks via Machine Unlearning Jun 19, 2024 Adversarial Attack Adversarial Defense
— Unverified 0AGSOA:Graph Neural Network Targeted Attack Based on Average Gradient and Structure Optimization Jun 19, 2024 Adversarial Attack
— Unverified 0Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation Jun 18, 2024 Adversarial Attack Semantic Similarity
— Unverified 0Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks Jun 18, 2024 Adversarial Attack Intrusion Detection
Code Code Available 0Imperceptible Face Forgery Attack via Adversarial Semantic Mask Jun 16, 2024 Adversarial Attack
Code Code Available 0RWKU: Benchmarking Real-World Knowledge Unlearning for Large Language Models Jun 16, 2024 Adversarial Attack Benchmarking
Code Code Available 2