XSS Adversarial Attacks Based on Deep Reinforcement Learning: A Replication and Extension Study Feb 26, 2025 Adversarial Attack Deep Reinforcement Learning
Code Code Available 0VGFL-SA: Vertical Graph Federated Learning Structure Attack Based on Contrastive Learning Feb 24, 2025 Adversarial Attack Contrastive Learning
— Unverified 0Improving the Transferability of Adversarial Examples by Inverse Knowledge Distillation Feb 24, 2025 Adversarial Attack Diversity
— Unverified 0Emoti-Attack: Zero-Perturbation Adversarial Attacks on NLP Systems via Emoji Sequences Feb 24, 2025 Adversarial Attack Adversarial Robustness
— Unverified 0Tracking the Copyright of Large Vision-Language Models through Parameter Learning Adversarial Images Feb 23, 2025 Adversarial Attack Question Answering
— Unverified 0A Multi-Scale Isolation Forest Approach for Real-Time Detection and Filtering of FGSM Adversarial Attacks in Video Streams of Autonomous Vehicles Feb 22, 2025 Adversarial Attack Autonomous Vehicles
— Unverified 0Moshi Moshi? A Model Selection Hijacking Adversarial Attack Feb 20, 2025 Adversarial Attack Computational Efficiency
— Unverified 0Towards Robust and Secure Embodied AI: A Survey on Vulnerabilities and Attacks Feb 18, 2025 Adversarial Attack Autonomous Vehicles
— Unverified 0PAR-AdvGAN: Improving Adversarial Attack Capability with Progressive Auto-Regression AdvGAN Feb 16, 2025 Adversarial Attack regression
— Unverified 0ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech Feb 13, 2025 Adversarial Attack Adversarial Attack Detection
— Unverified 0AdvSwap: Covert Adversarial Perturbation with High Frequency Info-swapping for Autonomous Driving Perception Feb 12, 2025 Adversarial Attack Autonomous Driving
— Unverified 0MAA: Meticulous Adversarial Attack against Vision-Language Pre-trained Models Feb 12, 2025 Adversarial Attack
— Unverified 0Universal Adversarial Attack on Aligned Multimodal LLMs Feb 11, 2025 Adversarial Attack
— Unverified 0Democratic Training Against Universal Adversarial Perturbations Feb 8, 2025 Adversarial Attack
— Unverified 0Rigid Body Adversarial Attacks Feb 8, 2025 Adversarial Attack
— Unverified 0BitAbuse: A Dataset of Visually Perturbed Texts for Defending Phishing Attacks Feb 6, 2025 Adversarial Attack
Code Code Available 0Wolfpack Adversarial Attack for Robust Multi-Agent Reinforcement Learning Feb 5, 2025 Adversarial Attack Multi-agent Reinforcement Learning
Code Code Available 0MARAGE: Transferable Multi-Model Adversarial Attack for Retrieval-Augmented Generation Data Extraction Feb 5, 2025 Adversarial Attack RAG
— Unverified 0Real-Time Privacy Risk Measurement with Privacy Tokens for Gradient Leakage Feb 5, 2025 Adversarial Attack
— Unverified 0CoRPA: Adversarial Image Generation for Chest X-rays Using Concept Vector Perturbations and Generative Models Feb 4, 2025 Adversarial Attack Diagnostic
— Unverified 0FRAUD-RLA: A new reinforcement learning adversarial attack against credit card fraud detection Feb 4, 2025 Adversarial Attack Fraud Detection
— Unverified 0Refining Adaptive Zeroth-Order Optimization at Ease Feb 3, 2025 Adversarial Attack
— Unverified 0Adversarial Attacks on AI-Generated Text Detection Models: A Token Probability-Based Approach Using Embeddings Jan 31, 2025 Adversarial Attack Text Detection
— Unverified 0Redefining Machine Unlearning: A Conformal Prediction-Motivated Approach Jan 31, 2025 Adversarial Attack Conformal Prediction
— Unverified 0Understanding Oversmoothing in GNNs as Consensus in Opinion Dynamics Jan 31, 2025 Adversarial Attack
— Unverified 0The Relationship Between Network Similarity and Transferability of Adversarial Attacks Jan 27, 2025 Adversarial Attack
— Unverified 0GreedyPixel: Fine-Grained Black-Box Adversarial Attack Via Greedy Algorithm Jan 24, 2025 Adversarial Attack Computational Efficiency
— Unverified 0Black-Box Adversarial Attack on Vision Language Models for Autonomous Driving Jan 23, 2025 Adversarial Attack Autonomous Driving
— Unverified 0Device-aware Optical Adversarial Attack for a Portable Projector-camera System Jan 23, 2025 Adversarial Attack Face Recognition
— Unverified 0Enhancing Adversarial Transferability via Component-Wise Transformation Jan 21, 2025 Adversarial Attack
— Unverified 0Robustness of Selected Learning Models under Label-Flipping Attack Jan 21, 2025 Adversarial Attack
— Unverified 0Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks Jan 21, 2025 Adversarial Attack All
— Unverified 0Differentiable Adversarial Attacks for Marked Temporal Point Processes Jan 17, 2025 Adversarial Attack Point Processes
Code Code Available 0Salient Information Preserving Adversarial Training Improves Clean and Robust Accuracy Jan 15, 2025 Adversarial Attack
— Unverified 0MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework Jan 13, 2025 Adversarial Attack
— Unverified 0Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities Jan 13, 2025 Adversarial Attack
— Unverified 0Effective faking of verbal deception detection with target-aligned adversarial attacks Jan 10, 2025 Adversarial Attack Deception Detection
— Unverified 0Enforcing Fundamental Relations via Adversarial Attacks on Input Parameter Correlations Jan 9, 2025 Activity Recognition Adversarial Attack
— Unverified 0Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective Jan 7, 2025 Adversarial Attack Deep Reinforcement Learning
— Unverified 0FlippedRAG: Black-Box Opinion Manipulation Adversarial Attacks to Retrieval-Augmented Generation Models Jan 6, 2025 Adversarial Attack Hallucination
— Unverified 0Distillation-Enhanced Physical Adversarial Attacks Jan 4, 2025 Adversarial Attack Knowledge Distillation
— Unverified 0AVTrustBench: Assessing and Enhancing Reliability and Robustness in Audio-Visual LLMs Jan 3, 2025 Adversarial Attack Diagnostic
— Unverified 0Adaptive Meta-learning-based Adversarial Training for Robust Automatic Modulation Classification Jan 3, 2025 Adversarial Attack Meta-Learning
— Unverified 0Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs Jan 2, 2025 Adversarial Attack Attribute
— Unverified 0Advancing Adversarial Robustness in GNeRFs: The IL2-NeRF Attack Jan 1, 2025 3D Reconstruction Adversarial Attack
Code Code Available 0I2VGuard: Safeguarding Images against Misuse in Diffusion-based Image-to-Video Models Jan 1, 2025 Adversarial Attack Image to Video Generation
— Unverified 0ProjAttacker: A Configurable Physical Adversarial Attack for Face Recognition via Projector Jan 1, 2025 Adversarial Attack Face Recognition
— Unverified 0Enhancing Adversarial Transferability with Checkpoints of a Single Model's Training Jan 1, 2025 Adversarial Attack Diversity
— Unverified 0Prompt2Perturb (P2P): Text-Guided Diffusion-Based Adversarial Attack on Breast Ultrasound Images Jan 1, 2025 Adversarial Attack Prompt Learning
— Unverified 0Adversarial Attack and Defense for LoRa Device Identification and Authentication via Deep Learning Dec 30, 2024 Adversarial Attack Density Estimation
— Unverified 0