Literature Database

Security Attacks on LLM-based Code Completion Tools

Authors: Wen Cheng, Ke Sun, Xinyu Zhang, Wei Wang | Published: 2024-08-20 | Updated: 2025-01-02
LLM Security
Prompt Injection
Attack Method

Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks

Authors: Hetvi Waghela, Jaydip Sen, Sneha Rakshit | Published: 2024-08-20
Poisoning
Adversarial Example
Defense Method

LeCov: Multi-level Testing Criteria for Large Language Models

Authors: Xuan Xie, Jiayang Song, Yuheng Huang, Da Song, Fuyuan Zhang, Felix Juefei-Xu, Lei Ma | Published: 2024-08-20
LLM Performance Evaluation
Test Prioritization
Prompt Injection

Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions

Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05
LLM Performance Evaluation
Privacy Protection Method
Evaluation Method

Privacy Technologies for Financial Intelligence

Authors: Yang Li, Thilina Ranbaduge, Kee Siong Ng | Published: 2024-08-19
Privacy Protection
Privacy Protection Method
Financial Intelligence

Transferring Backdoors between Large Language Models by Knowledge Distillation

Authors: Pengzhou Cheng, Zongru Wu, Tianjie Ju, Wei Du, Zhuosheng Zhang Gongshen Liu | Published: 2024-08-19
LLM Security
Backdoor Attack
Poisoning

Regularization for Adversarial Robust Learning

Authors: Jie Wang, Rui Gao, Yao Xie | Published: 2024-08-19 | Updated: 2024-08-22
Algorithm
Poisoning
Regularization

Antidote: Post-fine-tuning Safety Alignment for Large Language Models against Harmful Fine-tuning

Authors: Tiansheng Huang, Gautam Bhattacharya, Pratik Joshi, Josh Kimball, Ling Liu | Published: 2024-08-18 | Updated: 2024-09-03
LLM Security
Prompt Injection
Safety Alignment

Security Concerns in Quantum Machine Learning as a Service

Authors: Satwik Kundu, Swaroop Ghosh | Published: 2024-08-18
Cybersecurity
Data Obfuscation
Quantum Framework

Mitigating Noise Detriment in Differentially Private Federated Learning with Model Pre-training

Authors: Huitong Jin, Yipeng Zhou, Laizhong Cui, Quan Z. Sheng | Published: 2024-08-18
Watermarking
Privacy Protection Method
Model Performance Evaluation