Adversarial
Adversarial technology refers to methods that detect and enhance system security and robustness by simulating adversarial environments. Its core objective is to identify potential vulnerabilities and strengthen the model's ability to resist malicious attacks. This technology is widely applied in cybersecurity, machine learning model protection, and other fields, effectively ensuring the stable operation of systems and data security.
Red Teaming
47 papers | 0 benchmarks
Backdoor Attack
36 papers | 0 benchmarks
Adversarial Defense
34 papers | 10 benchmarks
Handwritten Text Recognition
32 papers | 13 benchmarks
Open-Domain Question Answering
30 papers | 15 benchmarks
Neural Rendering
29 papers | 0 benchmarks
Face Detection
25 papers | 13 benchmarks
DNN Testing
24 papers | 0 benchmarks
3D Architecture
23 papers | 0 benchmarks
Design Synthesis
21 papers | 0 benchmarks
LLM Jailbreak
18 papers | 0 benchmarks
Story Generation
18 papers | 5 benchmarks
Inference Attack
17 papers | 0 benchmarks
Exposure Fairness
15 papers | 0 benchmarks
Model extraction
14 papers | 1 benchmarks
Object
14 papers | 0 benchmarks
Real-World Adversarial Attack
14 papers | 0 benchmarks
Adversarial Attack
13 papers | 3 benchmarks
Reconstruction Attack
13 papers | 0 benchmarks
Phishing Website Detection
11 papers | 0 benchmarks
Adversarial Text
8 papers | 0 benchmarks
Adversarial Purification
7 papers | 0 benchmarks
Data Poisoning
7 papers | 0 benchmarks
Website Fingerprinting Attacks
7 papers | 1 benchmarks
Adversarial Robustness
5 papers | 7 benchmarks
Multi-View 3D Shape Retrieval
5 papers | 0 benchmarks
Provable Adversarial Defense
3 papers | 2 benchmarks
Adversarial Attack on Video Classification
2 papers | 0 benchmarks
Website Fingerprinting Defense
2 papers | 1 benchmarks
Backdoor Defense for Data-Free Distillation with Poisoned Teachers
1 papers | 0 benchmarks
Dataset Size Recovery
1 papers | 0 benchmarks
Misclassification Rate - Natural Adversarial Samples
1 papers | 0 benchmarks
Model Posioning
1 papers | 0 benchmarks
Optimize the trajectory of UAV which plays a BS in communication system
1 papers | 0 benchmarks