"adversarial attacks" Papers
115 papers found • Page 3 of 3
Conference
SignSGD with Federated Defense: Harnessing Adversarial Attacks through Gradient Sign Decoding
Chanho Park, Namyoon Lee
ICML 2024arXiv:2402.01340
5
citations
Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs
Dongjin Lee, Juho Lee, Kijung Shin
AAAI 2024paperarXiv:2308.10779
7
citations
SpecFormer: Guarding Vision Transformer Robustness via Maximum Singular Value Penalization
Xixu Hu, Runkai Zheng, Jindong Wang et al.
ECCV 2024arXiv:2402.03317
5
citations
Stealthy Adversarial Attacks on Stochastic Multi-Armed Bandits
Zhiwei Wang, Hongning Wang, Huazheng Wang
AAAI 2024paperarXiv:2402.13487
1
citations
The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks
Ziquan Liu, Yufei Cui, Yan Yan et al.
ICML 2024arXiv:2405.08886
9
citations
Towards Physical World Backdoor Attacks against Skeleton Action Recognition
Qichen Zheng, Yi Yu, SIYUAN YANG et al.
ECCV 2024arXiv:2408.08671
9
citations
Towards Robust Image Stitching: An Adaptive Resistance Learning against Compatible Attacks
Zhiying Jiang, Xingyuan Li, Jinyuan Liu et al.
AAAI 2024paperarXiv:2402.15959
14
citations
Towards the Theory of Unsupervised Federated Learning: Non-asymptotic Analysis of Federated EM Algorithms
Ye Tian, Haolei Weng, Yang Feng
ICML 2024arXiv:2310.15330
7
citations
Transferable 3D Adversarial Shape Completion using Diffusion Models
Xuelong Dai, Bin Xiao
ECCV 2024arXiv:2407.10077
1
citations
Trustworthy Actionable Perturbations
Jesse Friedbaum, Sudarshan Adiga, Ravi Tandon
ICML 2024arXiv:2405.11195
2
citations
Two Heads are Actually Better than One: Towards Better Adversarial Robustness via Transduction and Rejection
Nils Palumbo, Yang Guo, Xi Wu et al.
ICML 2024arXiv:2305.17528
Universal Robustness via Median Randomized Smoothing for Real-World Super-Resolution
Zakariya Chaouai, Mohamed Tamaazousti
CVPR 2024arXiv:2405.14934
5
citations
Unmasking Vulnerabilities: Cardinality Sketches under Adaptive Inputs
Sara Ahmadian, Edith Cohen
ICML 2024arXiv:2405.17780
6
citations
UPAM: Unified Prompt Attack in Text-to-Image Generation Models Against Both Textual Filters and Visual Checkers
Duo Peng, Qiuhong Ke, Jun Liu
ICML 2024arXiv:2405.11336
8
citations
WAVES: Benchmarking the Robustness of Image Watermarks
Bang An, Mucong Ding, Tahseen Rabbani et al.
ICML 2024arXiv:2401.08573
72
citations