Similar Items: Modeling Adversaries in a Logic for Security Protocol Analysis
- A Program Logic for Verifying Secure Routing Protocols
- Dynamic Tags for Security Protocols
- Improving Adversarial Transferability on Vision Transformers via Dual-Flow Adversarial Attack
- Generative Adversarial Networks: Dynamics
- On the Statistical Properties of Generative Adversarial Models for Low Intrinsic Data Dimension
- Integrating Adversarial Scenarios into LLM Security Labs: An Experience Report on a Hands-On Approach