Sponsor of the Day:
Jerkmate
https://arxiv.org/abs/2307.15043
[2307.15043] Universal and Transferable Adversarial Attacks on Aligned Language Models
Abstract page for arXiv paper 2307.15043: Universal and Transferable Adversarial Attacks on Aligned Language Models
adversarial attackslanguage models2307universaltransferable
https://data.4tu.nl/datasets/07d03003-5c7c-407f-bfb2-078df2e02b7f
Data underlying the publication: Realistic Adversarial Attacks for Robustness Evaluation of...
4TU.ResearchData is an international data repository for science, engineering and design. We offer research dataset curation, sharing, long-term access and...
adversarial attacksdataunderlyingpublicationrealistic
https://www.labsix.org/limited-information-adversarial-examples/
Black-box Adversarial Attacks with Limited Queries and Information · labsix
We've developed an algorithm that performs targeted attacks on black-box machine learning systems even when the attacker has access to only the predicted label...
black boxadversarial attackslimitedqueriesinformation
https://dblp.org/rec/journals/tcad/SunYRYH22.html
dblp: Counteracting Adversarial Attacks in Autonomous Driving.
Apr 30, 2026 - Bibliographic details on Counteracting Adversarial Attacks in Autonomous Driving.
adversarial attacksautonomous drivingdblpcounteracting
https://www.semanticscholar.org/search?q=Adversarial+Attacks+Against+IoT+Identification+Systems.
Adversarial Attacks Against IoT Identification Systems. | Semantic Scholar
An academic search engine that utilizes artificial intelligence methods to provide highly relevant results and novel tools to filter them with ease.
systems semantic scholaradversarial attacksiotidentification
https://www.semanticscholar.org/search?q=Adversarial+Attacks+on+Remote+User+Authentication+Using+Behavioural+Mouse+Dynamics.
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. | Semantic...
An academic search engine that utilizes artificial intelligence methods to provide highly relevant results and novel tools to filter them with ease.
user authentication usingadversarial attacksdynamics semanticremotebehavioural
https://www.menlosecurity.com/resources/protect-from-adversarial-use-of-genai-in-phishing-spear-phishing-and-malware-attacks
Protect from Adversarial Use of GenAI in Phishing, Spear Phishing, and Malware Attacks | Menlo...
malware attacksprotectadversarialusegenai
https://thehackernews.com/expert-insights/2025/08/defending-against-adversarial-ai-and.html
Defending Against Adversarial AI and Deepfake Attacks
Deepfake CFO scam stole $25.6M via fake video calls, proving adversarial AI is redefining identity fraud risks.
adversarial aideepfake attacksdefending
https://csrc.nist.gov/pubs/ai/100/2/e2023/final
AI 100-2 E2023, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations...
ai 100machine learning2adversarialtaxonomy
https://www.helpnetsecurity.com/2025/08/25/review-adversarial-ai-attacks-mitigations-and-defense-strategies/
Review: Adversarial AI Attacks, Mitigations, and Defense Strategies - Help Net Security
Review: Adversarial AI Attacks, Mitigations, and Defense Strategies shows how AI systems can be attacked and how defenders can prepare.
adversarial aidefense strategiesreviewattacksmitigations
https://s2lab.cs.ucl.ac.uk/projects/intriguing/
S2Lab · Intriguing Properties of Adversarial ML Attacks in the Problem Space
Intriguing Properties of Adversarial ML Attacks in the Problem Space
problem spaceintriguingpropertiesadversarialml