ML01
Input Manipulation Attack
Adversarial examples and evasion attacks on ML models
920 papers Browse all papers
Monthly publications
Paper types
attack 416
defense 370
benchmark 91
survey 29
tool 14
Domains
vision 620
nlp 337
multimodal 245
generative 63
audio 49
graph 34
tabular 29
reinforcement-learning 26
timeseries 18
federated-learning 14
Co-occurring categories
Other OWASP categories that appear on the same papers
LLM01 Prompt Injection
263 ML09 Output Integrity Attack
29 ML02 Data Poisoning Attack
27 ML10 Model Poisoning
17 LLM08 Excessive Agency
9 LS10 Benchmarks & Evaluation
8 LS06 Red-Team Agents
7 ML04 Membership Inference Attack
5 ML03 Model Inversion Attack
4 ML05 Model Theft
4 LLM04 Model Denial of Service
4 LLM06 Sensitive Information Disclosure
3 LS01 Vulnerability Discovery
3 LLM07 Insecure Plugin Design
2 LS02 Exploit Generation
2 ML08 Model Skewing
2 LS07 Blue-Team Agents
1Top cited papers
1342273124105968778696106
The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against Llm Jailbreaks and Prompt Injections
2025 benchmark
A Survey of Secure Semantic Communications
2025 survey
AVTrustBench: Assessing and Enhancing Reliability and Robustness in Audio-Visual LLMs
2025 benchmark
Vanish into Thin Air: Cross-prompt Universal Adversarial Attacks for SAM2
2025 attack
Parameter Interpolation Adversarial Training for Robust Image Classification
2025 defense
Revoking Amnesia: RL-based Trajectory Optimization to Resurrect Erased Concepts in Diffusion Models
2025 attack
Rerouting LLM Routers
2025 attack
Transferability of Adversarial Attacks in Video-based MLLMs: A Cross-modal Image-to-Video Approach
2025 attack
FORCE: Transferable Visual Jailbreaking Attacks via Feature Over-Reliance CorrEction
2025 attack
From Pretrain to Pain: Adversarial Vulnerability of Video Foundation Models Without Task Knowledge
2025 attack