adversarial


Rethinking Verification for LLM Code Generation: From Generation to Testing

Add code
Jul 09, 2025
Viaarxiv icon

Robust and Safe Traffic Sign Recognition using N-version with Weighted Voting

Add code
Jul 09, 2025
Viaarxiv icon

A Single-Point Measurement Framework for Robust Cyber-Attack Diagnosis in Smart Microgrids Using Dual Fractional-Order Feature Analysis

Add code
Jul 09, 2025
Viaarxiv icon

IAP: Invisible Adversarial Patch Attack through Perceptibility-Aware Localization and Perturbation Optimization

Add code
Jul 09, 2025
Viaarxiv icon

The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover

Add code
Jul 09, 2025
Viaarxiv icon

Distributed Fault-Tolerant Multi-Robot Cooperative Localization in Adversarial Environments

Add code
Jul 09, 2025
Viaarxiv icon

On the Robustness of Verbal Confidence of LLMs in Adversarial Attacks

Add code
Jul 09, 2025
Viaarxiv icon

Reward Models Can Improve Themselves: Reward-Guided Adversarial Failure Mode Discovery for Robust Reward Modeling

Add code
Jul 08, 2025
Viaarxiv icon

OpenAgentSafety: A Comprehensive Framework for Evaluating Real-World AI Agent Safety

Add code
Jul 08, 2025
Viaarxiv icon

The bitter lesson of misuse detection

Add code
Jul 08, 2025
Viaarxiv icon