Membership inference attacks on machine learning: A survey
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …
image classification, text generation, audio recognition, and graph data analysis. However …
Ai alignment: A comprehensive survey
AI alignment aims to make AI systems behave in line with human intentions and values. As
AI systems grow more capable, the potential large-scale risks associated with misaligned AI …
AI systems grow more capable, the potential large-scale risks associated with misaligned AI …
Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
A survey on adversarial attacks and defences
Deep learning has evolved as a strong and efficient framework that can be applied to a
broad spectrum of complex learning problems which were difficult to solve using the …
broad spectrum of complex learning problems which were difficult to solve using the …
Secure and robust machine learning for healthcare: A survey
Recent years have witnessed widespread adoption of machine learning (ML)/deep learning
(DL) techniques due to their superior performance for a variety of healthcare applications …
(DL) techniques due to their superior performance for a variety of healthcare applications …
Strip: A defence against trojan attacks on deep neural networks
A recent trojan attack on deep neural network (DNN) models is one insidious variant of data
poisoning attacks. Trojan attacks exploit an effective backdoor created in a DNN model by …
poisoning attacks. Trojan attacks exploit an effective backdoor created in a DNN model by …
Detecting backdoor attacks on deep neural networks by activation clustering
While machine learning (ML) models are being increasingly trusted to make decisions in
different and varying areas, the safety of systems using such models has become an …
different and varying areas, the safety of systems using such models has become an …
Quantum machine learning for 6G communication networks: State-of-the-art and vision for the future
The upcoming fifth generation (5G) of wireless networks is expected to lay a foundation of
intelligent networks with the provision of some isolated artificial intelligence (AI) operations …
intelligent networks with the provision of some isolated artificial intelligence (AI) operations …
Adversarial examples: Attacks and defenses for deep learning
With rapid progress and significant successes in a wide spectrum of applications, deep
learning is being applied in many safety-critical environments. However, deep neural …
learning is being applied in many safety-critical environments. However, deep neural …
Torchattacks: A pytorch repository for adversarial attacks
H Kim - arxiv preprint arxiv:2010.01950, 2020 - arxiv.org
Torchattacks : A Pytorch Repository for Adversarial Attacks Page 1 arxiv:2010.01950v3 [cs.LG]
19 Feb 2021 Torchattacks: A PyTorch Repository for Adversarial Attacks Hoki Kim Seoul …
19 Feb 2021 Torchattacks: A PyTorch Repository for Adversarial Attacks Hoki Kim Seoul …