{"id":13748,"date":"2026-04-06T16:10:44","date_gmt":"2026-04-06T16:10:44","guid":{"rendered":"https:\/\/k3ylabs.com\/?p=13748"},"modified":"2026-04-06T16:10:45","modified_gmt":"2026-04-06T16:10:45","slug":"k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains","status":"publish","type":"post","link":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/","title":{"rendered":"K3Y Ltd authors a paper on &#8220;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&#8221;"},"content":{"rendered":"<div id=\"pl-13748\"  class=\"panel-layout\" ><div id=\"pg-13748-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-13748-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-13748-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>K3Y Ltd is pleased to announce the publication of a new open-access scientific paper in the high-impact journal <em data-start=\"2664\" data-end=\"2689\">Computer Science Review<\/em> (Impact Factor: 12.7), titled <em>\u201cBeyond vulnerabilities: A comprehensive survey of adversarial attacks across domains\u201d.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The paper was developed in the context of the <a href=\"https:\/\/xtrust-6g.eu\/\"><strong>XTRUST-6G project<\/strong><\/a> and provides a comprehensive cross-domain analysis of adversarial attacks targeting modern AI systems. As artificial intelligence continues to play a key role across critical sectors, understanding and mitigating adversarial threats is becoming increasingly important.<\/p>\n<p>&nbsp;<\/p>\n<p>The authors (<span class=\"button-link-text-container\"><span class=\"button-link-text\"><span class=\"react-xocs-alternative-link\"><a href=\"https:\/\/www.linkedin.com\/in\/dimitris-christos-asimopoulos-2a627a262\/\"><span class=\"given-name\">Dimitrios Christos<\/span> <\/a><span class=\"text surname\"><a href=\"https:\/\/www.linkedin.com\/in\/dimitris-christos-asimopoulos-2a627a262\/\">Asimopoulos<\/a>,<\/span> <\/span><\/span><\/span><a href=\"https:\/\/www.linkedin.com\/in\/panagiotisrg\/\">Panagiotis Radoglou Grammatikis<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/georgios-th-papadopoulos-70569b15\/\"><span class=\"button-link-text-container\"><span class=\"button-link-text\"><span class=\"react-xocs-alternative-link\"><span class=\"given-name\">Georgios Th.<\/span> <span class=\"text surname\">Papadopoulos<\/span><\/span><\/span><\/span><\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/panagiotis-sarigiannidis-7636901a\/\">Panagiotis Sarigiannidis<\/a>) examine how adversarial attacks evolve across different domains and data modalities, offering valuable insights into their real-world impact on AI deployments.<\/p>\n<p>&nbsp;<\/p>\n<p>Key Contributions:<\/p>\n<p>- Comprehensive analysis of adversarial attacks across multiple data types<\/p>\n<p>- Structured taxonomy aligned with the MITRE ATLAS framework<\/p>\n<p>- Identification of vulnerabilities across diverse AI systems<\/p>\n<p>- Classification of attack techniques across domains and modalities<\/p>\n<p>- Cross-domain coverage, including IoT, healthcare, NLP, speech, and large language models (LLMs)<\/p>\n<p>&nbsp;<\/p>\n<p>The paper is publicly available at <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013726000717\">ScienceDirect<\/a>, <a href=\"https:\/\/zenodo.org\/records\/19426600\">Zenodo<\/a> and <a href=\"https:\/\/www.researchgate.net\/publication\/387343801_Beyond_Vulnerabilities_A_Comprehensive_Survey_of_Adversarial_Attacks_Across_Domains\">ResearchGate<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>This publication reflects K3Y Ltd\u2019s continued contribution to advancing secure and trustworthy AI systems within European research and innovation initiatives.<\/p>\n<p>&nbsp;<\/p>\n<p><em>This work has received funding from the <span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">European Union and the Swiss State Secretariat for Education, Research and Innovation (SERI) under the grant agreement No 101192749 (XTRUST-6G)<\/span><\/span>. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the granting authority. Neither the European Union nor the granting authority can be held responsible for them.<\/em><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>K3Y Ltd is pleased to announce the publication of a new open-access scientific paper in the high-impact journal Computer Science Review (Impact Factor: 12.7), titled \u201cBeyond vulnerabilities: A comprehensive survey of adversarial attacks across domains\u201d. &nbsp; The paper was developed in the context of the XTRUST-6G project and provides a comprehensive cross-domain analysis of adversarial&hellip; <a class=\"more-link\" href=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/\">\u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf <span class=\"screen-reader-text\">K3Y Ltd authors a paper on &#8220;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&#8221;<\/span><\/a><\/p>","protected":false},"author":4,"featured_media":13749,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[8],"class_list":["post-13748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>K3Y Ltd authors a paper on &quot;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&quot; - k3y<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"K3Y Ltd authors a paper on &quot;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&quot; - k3y\" \/>\n<meta property=\"og:description\" content=\"K3Y Ltd is pleased to announce the publication of a new open-access scientific paper in the high-impact journal Computer Science Review (Impact Factor: 12.7), titled \u201cBeyond vulnerabilities: A comprehensive survey of adversarial attacks across domains\u201d. &nbsp; The paper was developed in the context of the XTRUST-6G project and provides a comprehensive cross-domain analysis of adversarial&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf K3Y Ltd authors a paper on &#8220;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&#8221;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/\" \/>\n<meta property=\"og:site_name\" content=\"k3y\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-06T16:10:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T16:10:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/04\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1453\" \/>\n\t<meta property=\"og:image:height\" content=\"871\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"k3y news\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"k3y news\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 \u03bb\u03b5\u03c0\u03c4\u03ac\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/\"},\"author\":{\"name\":\"k3y news\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"headline\":\"K3Y Ltd authors a paper on &#8220;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&#8221;\",\"datePublished\":\"2026-04-06T16:10:44+00:00\",\"dateModified\":\"2026-04-06T16:10:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/\"},\"wordCount\":289,\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg\",\"keywords\":[\"News\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"el\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/\",\"name\":\"K3Y Ltd authors a paper on \\\"Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains\\\" - k3y\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg\",\"datePublished\":\"2026-04-06T16:10:44+00:00\",\"dateModified\":\"2026-04-06T16:10:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/#primaryimage\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg\",\"contentUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg\",\"width\":1453,\"height\":871},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/k3ylabs.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"K3Y Ltd authors a paper on &#8220;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/\",\"name\":\"k3y\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/k3ylabs.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"el\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\",\"name\":\"k3y news\",\"sameAs\":[\"https:\\\/\\\/deasytal.com\\\/\"],\"url\":\"https:\\\/\\\/k3ylabs.com\\\/el\\\/author\\\/k3y\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"K3Y Ltd authors a paper on \"Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains\" - k3y","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/","og_locale":"el_GR","og_type":"article","og_title":"K3Y Ltd authors a paper on \"Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains\" - k3y","og_description":"K3Y Ltd is pleased to announce the publication of a new open-access scientific paper in the high-impact journal Computer Science Review (Impact Factor: 12.7), titled \u201cBeyond vulnerabilities: A comprehensive survey of adversarial attacks across domains\u201d. &nbsp; The paper was developed in the context of the XTRUST-6G project and provides a comprehensive cross-domain analysis of adversarial&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf K3Y Ltd authors a paper on &#8220;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&#8221;","og_url":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/","og_site_name":"k3y","article_published_time":"2026-04-06T16:10:44+00:00","article_modified_time":"2026-04-06T16:10:45+00:00","og_image":[{"width":1453,"height":871,"url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/04\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg","type":"image\/jpeg"}],"author":"k3y news","twitter_card":"summary_large_image","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"k3y news","\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2":"2 \u03bb\u03b5\u03c0\u03c4\u03ac"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/#article","isPartOf":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/"},"author":{"name":"k3y news","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"headline":"K3Y Ltd authors a paper on &#8220;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&#8221;","datePublished":"2026-04-06T16:10:44+00:00","dateModified":"2026-04-06T16:10:45+00:00","mainEntityOfPage":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/"},"wordCount":289,"image":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/04\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg","keywords":["News"],"articleSection":["Blog"],"inLanguage":"el"},{"@type":"WebPage","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/","url":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/","name":"K3Y Ltd authors a paper on \"Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains\" - k3y","isPartOf":{"@id":"https:\/\/k3ylabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/#primaryimage"},"image":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/04\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg","datePublished":"2026-04-06T16:10:44+00:00","dateModified":"2026-04-06T16:10:45+00:00","author":{"@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"breadcrumb":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/"]}]},{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/#primaryimage","url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/04\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg","contentUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2026\/04\/Paper-Beyond-vulnerabilities_A-comprehensive-survey-of-adversarial-attacks-across-domains_cover.jpg","width":1453,"height":871},{"@type":"BreadcrumbList","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-beyond-vulnerabilities-a-comprehensive-survey-of-adversarial-attacks-across-domains\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/k3ylabs.com\/"},{"@type":"ListItem","position":2,"name":"K3Y Ltd authors a paper on &#8220;Beyond vulnerabilities: A comprehensive survey of adversarial attacks across domains&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/k3ylabs.com\/#website","url":"https:\/\/k3ylabs.com\/","name":"k3y","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/k3ylabs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"el"},{"@type":"Person","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04","name":"k3y news","sameAs":["https:\/\/deasytal.com\/"],"url":"https:\/\/k3ylabs.com\/el\/author\/k3y\/"}]}},"_links":{"self":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/13748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/comments?post=13748"}],"version-history":[{"count":5,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/13748\/revisions"}],"predecessor-version":[{"id":13754,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/13748\/revisions\/13754"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media\/13749"}],"wp:attachment":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media?parent=13748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/categories?post=13748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/tags?post=13748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}