"adversarial attacks" Papers

115 papers found • Page 3 of 3

SignSGD with Federated Defense: Harnessing Adversarial Attacks through Gradient Sign Decoding

Chanho Park, Namyoon Lee

ICML 2024arXiv:2402.01340
5
citations

Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs

Dongjin Lee, Juho Lee, Kijung Shin

AAAI 2024paperarXiv:2308.10779
7
citations

SpecFormer: Guarding Vision Transformer Robustness via Maximum Singular Value Penalization

Xixu Hu, Runkai Zheng, Jindong Wang et al.

ECCV 2024arXiv:2402.03317
5
citations

Stealthy Adversarial Attacks on Stochastic Multi-Armed Bandits

Zhiwei Wang, Hongning Wang, Huazheng Wang

AAAI 2024paperarXiv:2402.13487
1
citations

The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks

Ziquan Liu, Yufei Cui, Yan Yan et al.

ICML 2024arXiv:2405.08886
9
citations

Towards Physical World Backdoor Attacks against Skeleton Action Recognition

Qichen Zheng, Yi Yu, SIYUAN YANG et al.

ECCV 2024arXiv:2408.08671
9
citations

Towards Robust Image Stitching: An Adaptive Resistance Learning against Compatible Attacks

Zhiying Jiang, Xingyuan Li, Jinyuan Liu et al.

AAAI 2024paperarXiv:2402.15959
14
citations

Towards the Theory of Unsupervised Federated Learning: Non-asymptotic Analysis of Federated EM Algorithms

Ye Tian, Haolei Weng, Yang Feng

ICML 2024arXiv:2310.15330
7
citations

Transferable 3D Adversarial Shape Completion using Diffusion Models

Xuelong Dai, Bin Xiao

ECCV 2024arXiv:2407.10077
1
citations

Trustworthy Actionable Perturbations

Jesse Friedbaum, Sudarshan Adiga, Ravi Tandon

ICML 2024arXiv:2405.11195
2
citations

Two Heads are Actually Better than One: Towards Better Adversarial Robustness via Transduction and Rejection

Nils Palumbo, Yang Guo, Xi Wu et al.

ICML 2024arXiv:2305.17528

Universal Robustness via Median Randomized Smoothing for Real-World Super-Resolution

Zakariya Chaouai, Mohamed Tamaazousti

CVPR 2024arXiv:2405.14934
5
citations

Unmasking Vulnerabilities: Cardinality Sketches under Adaptive Inputs

Sara Ahmadian, Edith Cohen

ICML 2024arXiv:2405.17780
6
citations

UPAM: Unified Prompt Attack in Text-to-Image Generation Models Against Both Textual Filters and Visual Checkers

Duo Peng, Qiuhong Ke, Jun Liu

ICML 2024arXiv:2405.11336
8
citations

WAVES: Benchmarking the Robustness of Image Watermarks

Bang An, Mucong Ding, Tahseen Rabbani et al.

ICML 2024arXiv:2401.08573
72
citations