adversarial


Whisper Leak: a side-channel attack on Large Language Models

Add code
Nov 05, 2025
Viaarxiv icon

SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection

Add code
Nov 05, 2025
Viaarxiv icon

EQ-Negotiator: Dynamic Emotional Personas Empower Small Language Models for Edge-Deployable Credit Negotiation

Add code
Nov 05, 2025
Viaarxiv icon

ANCHOR: Integrating Adversarial Training with Hard-mined Supervised Contrastive Learning for Robust Representation Learning

Add code
Oct 31, 2025
Viaarxiv icon

A Hybrid Deep Learning and Forensic Approach for Robust Deepfake Detection

Add code
Oct 31, 2025
Viaarxiv icon

ZEBRA: Towards Zero-Shot Cross-Subject Generalization for Universal Brain Visual Decoding

Add code
Oct 31, 2025
Viaarxiv icon

Rethinking Robust Adversarial Concept Erasure in Diffusion Models

Add code
Oct 31, 2025
Viaarxiv icon

Trans-defense: Transformer-based Denoiser for Adversarial Defense with Spatial-Frequency Domain Representation

Add code
Oct 31, 2025
Viaarxiv icon

C-LEAD: Contrastive Learning for Enhanced Adversarial Defense

Add code
Oct 31, 2025
Viaarxiv icon

Low-Altitude UAV-Carried Movable Antenna for Joint Wireless Power Transfer and Covert Communications

Add code
Oct 30, 2025
Figure 1 for Low-Altitude UAV-Carried Movable Antenna for Joint Wireless Power Transfer and Covert Communications
Figure 2 for Low-Altitude UAV-Carried Movable Antenna for Joint Wireless Power Transfer and Covert Communications
Figure 3 for Low-Altitude UAV-Carried Movable Antenna for Joint Wireless Power Transfer and Covert Communications
Figure 4 for Low-Altitude UAV-Carried Movable Antenna for Joint Wireless Power Transfer and Covert Communications
Viaarxiv icon