adversarial


Anti-I2V: Safeguarding your photos from malicious image-to-video generation

Add code
Mar 25, 2026
Viaarxiv icon

Claudini: Autoresearch Discovers State-of-the-Art Adversarial Attack Algorithms for LLMs

Add code
Mar 25, 2026
Viaarxiv icon

Cost-Sensitive Neighborhood Aggregation for Heterophilous Graphs: When Does Per-Edge Routing Help?

Add code
Mar 25, 2026
Viaarxiv icon

Decentralized End-to-End Multi-AAV Pursuit Using Predictive Spatio-Temporal Observation via Deep Reinforcement Learning

Add code
Mar 25, 2026
Viaarxiv icon

Attack Assessment and Augmented Identity Recognition for Human Skeleton Data

Add code
Mar 25, 2026
Viaarxiv icon

Uncovering Memorization in Timeseries Imputation models: LBRM Membership Inference and its link to attribute Leakage

Add code
Mar 25, 2026
Viaarxiv icon

HEART-PFL: Stable Personalized Federated Learning under Heterogeneity with Hierarchical Directional Alignment and Adversarial Knowledge Transfer

Add code
Mar 25, 2026
Viaarxiv icon

Walma: Learning to See Memory Corruption in WebAssembly

Add code
Mar 25, 2026
Viaarxiv icon

Alignment Reduces Expressed but Not Encoded Gender Bias: A Unified Framework and Study

Add code
Mar 25, 2026
Viaarxiv icon

Toward a Multi-Layer ML-Based Security Framework for Industrial IoT

Add code
Mar 25, 2026
Viaarxiv icon