8. Bhagwatkar, R., Nayak, S., Bashivan, P., & Rish, I. (2024). Improving Adversarial Robustness in
VisionLanguage Models with Architecture and Prompt Design. Conference on Empirical Methods in
Natural Language Processing.
9. Bhardwaj, P., Kelleher, J.D., Costabello, L., & O’Sullivan, D. (2021). Adversarial Attacks on Knowledge
Graph Embeddings via Instance Attribution Methods. ArXiv, abs/2111.03120. [10] Bitton, R., Avraham,
D., Klevansky, E., Mimran, D., Brodt, O., Lehmann, H., Elovici, Y., & Shabtai, A. (2022). Adversarial
Machine Learning Threat Analysis in Open Radio Access Networks. ArXiv, abs/2201.06093.
10. Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., & Mukhopadhyay, D. (2018). Adversarial Attacks
and Defences: A Survey. ArXiv, abs/1810.00069.
11. Chakraborty, A., Alam, M., Dey, V., Chattopadhyay, A., & Mukhopadhyay, D. (2021). A survey on
adversarial attacks and defences. CAAI Trans. Intell. Technol., 6, 25-45.
12. Chang, K., He, H., Jia, R., & Singh, S. (2021). Robustness and Adversarial Examples in Natural
Language Processing. Proceedings of the 2021 Conference on Empirical Methods in Natural Language
Processing: Tutorial Abstracts.
13. Chen, J., Zhang, J., Zhao, Y., Han, H., Zhu, K., & Chen, B. (2020). Beyond Model-Level Membership
Privacy Leakage: an Adversarial Approach in Federated Learning. 2020 29th International Conference on
Computer Communications and Networks (ICCCN), 1-9.
14. Chen, P., & Liu, S. (2022). Holistic Adversarial Robustness of Deep Learning Models. AAAI Conference
on Artificial Intelligence.
15. Chiejina, A.J., Kim, B., Chowhdury, K., & Shah, V.K. (2024). System-level Analysis of Adversarial
Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. Proceedings of the 17th ACM
Conference on Security and Privacy in Wireless and Mobile Networks.
16. Chuang, K., Huang, H., & Li, T. (2025). DINA: A Dual Defense Framework Against Internal Noise and
External Attacks in Natural Language Processing. ArXiv, abs/2508.05671.
17. Dogra, V., Verma, S., Kavita, .., Woźniak, M., Shafi, J., & Ijaz, M.F. (2024). Shortcut Learning
Explanations for Deep Natural Language Processing: A Survey on Dataset Biases. IEEE Access, 12,
26183-26195.
18. Ennaji, S., Benkhelifa, E., & Mancini, L.V. (2025). Toward Realistic Adversarial Attacks in IDS: A Novel
Feasibility Metric for Transferability. ArXiv, abs/2504.08480.
19. Gomathy, D.B., Jayachitra, D.T., Rajkumar, D.R., Lalithamani, M.V., Ghantasala, G.S., Anantraj, M.I.,
Shyamala, D.C., Rajkumar, G.V., & Saranya, S. (2024). Adversarial Training for Robust Natural
Language Processing: A Focus on Sentiment Analysis and Machine Translation. Communications on
Applied Nonlinear Analysis.
20. Haibin, Z., Jinyin, C., Yan, Z., Xuhong, Z., Chunpeng, G., Zhe, L., Yike, O., & Shouling, J. (2021).
Survey of Adversarial Attack, Defense and Robustness Analysis for Natural Language Processing. Journal
of Computer Research and Development, 58, 1727.
21. Hong, H., Zhang, X., Wang, B., Ba, Z., & Hong, Y. (2023). Certifiable Black-Box Attacks with
Randomized Adversarial Examples: Breaking Defenses with Provable Confidence. Proceedings of the
2024 on ACM SIGSAC Conference on Computer and Communications Security.
22. Jin, X., Vinzamuri, B., Venkatapathy, S., Ji, H., & Natarajan, P. (2023). Adversarial Robustness for Large
Language NER models using Disentanglement and Word Attributions. Conference on Empirical Methods
in Natural Language Processing.
23. Kalin, J., Noever, D.A., & Ciolino, M. (2021). A Modified Drake Equation for Assessing Adversarial Risk
to Machine Learning Models. ArXiv, abs/2103.02718.
24. Kalin, J., Noever, D.A., Ciolino, M., Hambrick, D., & Dozier, G.V. (2021). Automating defense against
adversarial attacks: discovery of vulnerabilities and application of multi-INT imagery to protect deployed
models. Defense + Commercial Sensing.
25. Kang, A.R., Jeong, Y., Kim, S.L., & Woo, J. (2019). Malicious PDF Detection Model against Adversarial
Attack Built from Benign PDF Containing JavaScript. Applied Sciences.
26. Kapoor, S., Surendranath Girija, S., Arora, L., Pradhan, D., Shetgaonkar, A., & Raj, A. (2025).
Adversarial Attacks in Multimodal Systems: A Practitioner’s Survey. 2025 IEEE 49th Annual Computers,
Software, and Applications Conference (COMPSAC), 1643-1650.
27. Kovářová, M. (2024). Exploring Zero-Day Attacks on Machine Learning and Deep Learning Algorithms.
European Conference on Cyber Warfare and Security.
Page 1937