<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 4 April 2026 at 01:46 by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://zahalka.net/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Jan Zahálka</title>
		<link><![CDATA[https://zahalka.net]]></link>
		<description><![CDATA[Jan Zahálka]]></description>
		<lastBuildDate><![CDATA[Wed, 30 Aug 2023 15:25:54 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://zahalka.net/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/]]></link>
			<title>zahalka.net: AI &#038; security blog</title>
			<pubDate><![CDATA[Wed, 30 Aug 2023 15:25:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/09/backdoor-attacks-defense-cvpr-23-how-to-build-and-burn-trojan-horses/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/09/backdoor-attacks-defense-cvpr-23-how-to-build-and-burn-trojan-horses/]]></link>
			<title>Backdoor attacks &#038; defense @ CVPR &#8217;23: How to build and burn Trojan horses</title>
			<pubDate><![CDATA[Wed, 20 Sep 2023 08:41:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/]]></guid>
			<link><![CDATA[https://zahalka.net/]]></link>
			<title>Welcome!</title>
			<pubDate><![CDATA[Wed, 17 Apr 2024 06:59:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2024/01/can-chatgpt-read-who-you-are/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2024/01/can-chatgpt-read-who-you-are/]]></link>
			<title>Can ChatGPT read who you are?</title>
			<pubDate><![CDATA[Wed, 24 Jan 2024 10:11:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/12/a-cyberattackers-little-helper-jailbreaking-llm-security/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/12/a-cyberattackers-little-helper-jailbreaking-llm-security/]]></link>
			<title>A cyberattacker&#8217;s little helper: Jailbreaking LLM security</title>
			<pubDate><![CDATA[Wed, 20 Dec 2023 12:21:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/10/reality-can-be-lying-deepfakes-and-image-manipulation-cvpr-23/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/10/reality-can-be-lying-deepfakes-and-image-manipulation-cvpr-23/]]></link>
			<title>Reality can be lying: Deepfakes and image manipulation @ CVPR &#8217;23</title>
			<pubDate><![CDATA[Wed, 18 Oct 2023 07:51:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2024/02/whats-more-powerful-than-one-adversarial-attack/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2024/02/whats-more-powerful-than-one-adversarial-attack/]]></link>
			<title>What&#8217;s more powerful than one adversarial attack?</title>
			<pubDate><![CDATA[Wed, 14 Feb 2024 08:53:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2024/01/elves-explain-how-to-understand-adversarial-attacks/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2024/01/elves-explain-how-to-understand-adversarial-attacks/]]></link>
			<title>Elves explain how to understand adversarial attacks</title>
			<pubDate><![CDATA[Wed, 10 Jan 2024 09:52:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/10/privacy-attacks-cvpr-23-how-to-steal-models-and-data/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/10/privacy-attacks-cvpr-23-how-to-steal-models-and-data/]]></link>
			<title>Privacy attacks @ CVPR &#8217;23: How to steal models and data</title>
			<pubDate><![CDATA[Wed, 04 Oct 2023 08:29:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/11/ai-security-cvpr-23-honzas-highlights-conclusion/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/11/ai-security-cvpr-23-honzas-highlights-conclusion/]]></link>
			<title>AI security @ CVPR &#8217;23: Honza&#8217;s highlights &#038; conclusion</title>
			<pubDate><![CDATA[Wed, 01 Nov 2023 12:09:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/teaching/]]></guid>
			<link><![CDATA[https://zahalka.net/teaching/]]></link>
			<title>Teaching</title>
			<pubDate><![CDATA[Tue, 06 Feb 2024 08:31:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/06/cheatsheet-of-ai-security-papers-from-cvpr-22/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/06/cheatsheet-of-ai-security-papers-from-cvpr-22/]]></link>
			<title>Cheatsheet of AI security papers from CVPR &#8217;22</title>
			<pubDate><![CDATA[Thu, 28 Sep 2023 15:06:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/publications/]]></guid>
			<link><![CDATA[https://zahalka.net/publications/]]></link>
			<title>Publications</title>
			<pubDate><![CDATA[Mon, 23 Sep 2024 09:13:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/09/from-maybe-to-absolutely-sure-certifiable-security-at-cvpr-23/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/09/from-maybe-to-absolutely-sure-certifiable-security-at-cvpr-23/]]></link>
			<title>From &#8220;maybe&#8221; to &#8220;absolutely sure&#8221;: Certifiable security at CVPR &#8217;23</title>
			<pubDate><![CDATA[Wed, 13 Sep 2023 11:05:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/09/how-to-see-properly-adversarial-defense-by-data-inspection/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/09/how-to-see-properly-adversarial-defense-by-data-inspection/]]></link>
			<title>How to see properly: Adversarial defense by data inspection</title>
			<pubDate><![CDATA[Wed, 06 Sep 2023 13:01:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/05/ai-security-cvpr-22-non-classic-adversarial-attacks-research/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/05/ai-security-cvpr-22-non-classic-adversarial-attacks-research/]]></link>
			<title>AI security @ CVPR &#8217;22: Non-classic adversarial attacks research</title>
			<pubDate><![CDATA[Tue, 12 Sep 2023 14:01:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/11/judging-llm-security-how-to-make-sure-large-language-models-are-helping-us/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/11/judging-llm-security-how-to-make-sure-large-language-models-are-helping-us/]]></link>
			<title>Judging LLM security: How to make sure large language models are helping us?</title>
			<pubDate><![CDATA[Fri, 01 Dec 2023 12:19:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/subscribe/]]></guid>
			<link><![CDATA[https://zahalka.net/subscribe/]]></link>
			<title>Subscribe</title>
			<pubDate><![CDATA[Wed, 30 Aug 2023 14:14:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/06/ai-security-cvpr-23-introduction-stats/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/06/ai-security-cvpr-23-introduction-stats/]]></link>
			<title>AI security @ CVPR &#8217;23</title>
			<pubDate><![CDATA[Wed, 01 Nov 2023 12:17:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/subscription-confirmed/]]></guid>
			<link><![CDATA[https://zahalka.net/subscription-confirmed/]]></link>
			<title>Subscription successful!</title>
			<pubDate><![CDATA[Wed, 30 Aug 2023 14:08:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/06/ai-security-cvpr-22-model-inversion-attacks-research/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/06/ai-security-cvpr-22-model-inversion-attacks-research/]]></link>
			<title>AI security @ CVPR &#8217;22: Model inversion attacks research</title>
			<pubDate><![CDATA[Wed, 30 Aug 2023 14:07:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/confirm-your-e-mail/]]></guid>
			<link><![CDATA[https://zahalka.net/confirm-your-e-mail/]]></link>
			<title>Email confirmation</title>
			<pubDate><![CDATA[Wed, 30 Aug 2023 13:46:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/08/adversarial-training-a-security-workout-for-ai-models/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/08/adversarial-training-a-security-workout-for-ai-models/]]></link>
			<title>Adversarial training: a security workout for AI models</title>
			<pubDate><![CDATA[Wed, 30 Aug 2023 09:34:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/07/from-one-model-to-another-transferable-attacks-research-cvpr-23/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/07/from-one-model-to-another-transferable-attacks-research-cvpr-23/]]></link>
			<title>From one model to another: Transferable attacks research @ CVPR &#8217;23</title>
			<pubDate><![CDATA[Wed, 19 Jul 2023 09:46:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/08/better-model-architecture-better-adversarial-defense/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/08/better-model-architecture-better-adversarial-defense/]]></link>
			<title>Better model architecture, better adversarial defense</title>
			<pubDate><![CDATA[Wed, 16 Aug 2023 10:17:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/07/new-adversarial-attacks-on-computer-vision-from-cvpr-23/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/07/new-adversarial-attacks-on-computer-vision-from-cvpr-23/]]></link>
			<title>New adversarial attacks on computer vision from CVPR &#8217;23</title>
			<pubDate><![CDATA[Wed, 12 Jul 2023 14:17:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/08/which-model-architecture-is-the-best-in-adversarial-defense/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/08/which-model-architecture-is-the-best-in-adversarial-defense/]]></link>
			<title>Which model architecture is the best in adversarial defense?</title>
			<pubDate><![CDATA[Wed, 09 Aug 2023 12:57:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/08/real-world-ai-security-physical-adversarial-attacks-research-from-cvpr-23/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/08/real-world-ai-security-physical-adversarial-attacks-research-from-cvpr-23/]]></link>
			<title>Real-world AI security: Physical adversarial attacks research from CVPR &#8217;23</title>
			<pubDate><![CDATA[Wed, 02 Aug 2023 09:24:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/05/from-ai-security-to-the-real-world-physical-adversarial-attacks-research-cvpr-22/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/05/from-ai-security-to-the-real-world-physical-adversarial-attacks-research-cvpr-22/]]></link>
			<title>From AI security to the real world: Physical adversarial attacks research @ CVPR &#8217;22</title>
			<pubDate><![CDATA[Tue, 01 Aug 2023 09:01:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/07/the-best-ai-security-papers-from-cvpr-23-official-highlights/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/07/the-best-ai-security-papers-from-cvpr-23-official-highlights/]]></link>
			<title>The best AI security papers from CVPR &#8217;23: Official highlights</title>
			<pubDate><![CDATA[Wed, 12 Jul 2023 14:17:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/06/ai-security-cvpr-22-image-manipulation-deepfake-detection-research/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/06/ai-security-cvpr-22-image-manipulation-deepfake-detection-research/]]></link>
			<title>AI security @ CVPR &#8217;22: Image manipulation &#038; deepfake detection research</title>
			<pubDate><![CDATA[Wed, 12 Jul 2023 14:16:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/05/ai-security-cvpr-22-backdoor-trojan-attacks-research/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/05/ai-security-cvpr-22-backdoor-trojan-attacks-research/]]></link>
			<title>AI security @ CVPR &#8217;22: Backdoor/Trojan attacks research</title>
			<pubDate><![CDATA[Wed, 12 Jul 2023 14:16:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/05/are-there-guarantees-in-ai-security-certifiable-defense-research-cvpr-22/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/05/are-there-guarantees-in-ai-security-certifiable-defense-research-cvpr-22/]]></link>
			<title>Are there guarantees in AI security? Certifiable defense research @ CVPR &#8217;22</title>
			<pubDate><![CDATA[Wed, 12 Jul 2023 14:15:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/05/ai-security-cvpr-22-adversarial-attacks-defense-research-part-1/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/05/ai-security-cvpr-22-adversarial-attacks-defense-research-part-1/]]></link>
			<title>AI &#038; security @ CVPR &#8217;22: Classic adversarial attacks research</title>
			<pubDate><![CDATA[Wed, 12 Jul 2023 14:15:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/05/how-secure-is-computer-vision-ai-security-at-cvpr-22/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/05/how-secure-is-computer-vision-ai-security-at-cvpr-22/]]></link>
			<title>How secure is computer vision? AI &#038; security at CVPR &#8217;22</title>
			<pubDate><![CDATA[Wed, 12 Jul 2023 14:14:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/ai_security_blog/2023/06/how-to-intuitively-understand-adversarial-attacks-on-ai-models/]]></guid>
			<link><![CDATA[https://zahalka.net/ai_security_blog/2023/06/how-to-intuitively-understand-adversarial-attacks-on-ai-models/]]></link>
			<title>How to intuitively understand adversarial attacks on AI models</title>
			<pubDate><![CDATA[Tue, 20 Jun 2023 15:04:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/sample-page/]]></guid>
			<link><![CDATA[https://zahalka.net/sample-page/]]></link>
			<title>Sample Page</title>
			<pubDate><![CDATA[Fri, 28 Apr 2023 08:14:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://zahalka.net/privacy-policy/]]></guid>
			<link><![CDATA[https://zahalka.net/privacy-policy/]]></link>
			<title>Privacy policy</title>
			<pubDate><![CDATA[Fri, 19 May 2023 07:23:39 +0000]]></pubDate>
		</item>
				</channel>
</rss>
