Anomaly Detection • Intrusion Detection • Network Intrusion Detection • Adversarial Attack • Object Detection • Out-of-Distribution Detection • 2D Object Detection • Inference Attack • Object Reconstruction • Real-World Adversarial Attack