HyperAI

Adversarial

Adversarial technology refers to methods that detect and enhance system security and robustness by simulating adversarial environments. Its core objective is to identify potential vulnerabilities and strengthen the model's ability to resist malicious attacks. This technology is widely applied in cybersecurity, machine learning model protection, and other fields, effectively ensuring the stable operation of systems and data security.

Red Teaming

47 papers | 0 benchmarks

Backdoor Attack

36 papers | 0 benchmarks

Adversarial Defense

34 papers | 10 benchmarks

Handwritten Text Recognition

32 papers | 13 benchmarks

Open-Domain Question Answering

30 papers | 15 benchmarks

Neural Rendering

29 papers | 0 benchmarks

Face Detection

25 papers | 13 benchmarks

DNN Testing

24 papers | 0 benchmarks

3D Architecture

23 papers | 0 benchmarks

Design Synthesis

21 papers | 0 benchmarks

LLM Jailbreak

18 papers | 0 benchmarks

Story Generation

18 papers | 5 benchmarks

Inference Attack

17 papers | 0 benchmarks

Exposure Fairness

15 papers | 0 benchmarks

Model extraction

14 papers | 1 benchmarks

Object

14 papers | 0 benchmarks

Real-World Adversarial Attack

14 papers | 0 benchmarks

Adversarial Attack

13 papers | 3 benchmarks

Reconstruction Attack

13 papers | 0 benchmarks

Phishing Website Detection

11 papers | 0 benchmarks

Adversarial Text

8 papers | 0 benchmarks

Adversarial Purification

7 papers | 0 benchmarks

Data Poisoning

7 papers | 0 benchmarks

Website Fingerprinting Attacks

7 papers | 1 benchmarks

Adversarial Robustness

5 papers | 7 benchmarks

Multi-View 3D Shape Retrieval

5 papers | 0 benchmarks

Provable Adversarial Defense

3 papers | 2 benchmarks

Adversarial Attack on Video Classification

2 papers | 0 benchmarks

Website Fingerprinting Defense

2 papers | 1 benchmarks

Backdoor Defense for Data-Free Distillation with Poisoned Teachers

1 papers | 0 benchmarks

Dataset Size Recovery

1 papers | 0 benchmarks

Misclassification Rate - Natural Adversarial Samples

1 papers | 0 benchmarks

Model Posioning

1 papers | 0 benchmarks

Optimize the trajectory of UAV which plays a BS in communication system

1 papers | 0 benchmarks