Literature Database

Language Model Inversion

Authors: John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush | Published: 2023-11-22
Prompt leaking
Model Inversion
Model Evaluation

Transfer Attacks and Defenses for Large Language Models on Coding Tasks

Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu | Published: 2023-11-22
Prompt Injection
Adversarial attack
Defense Method

How Far Have We Gone in Vulnerability Detection Using Large Language Models

Authors: Zeyu Gao, Hao Wang, Yuchen Zhou, Wenyu Zhu, Chao Zhang | Published: 2023-11-21 | Updated: 2023-12-22
Code Change Analysis
Vulnerability detection
Evaluation Method

DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20
Adversarial attack
Machine Learning Method
Dimensionality Reduction Method

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni | Published: 2023-11-20
IoT Device Identification
Cyber Attack
Deep Learning Method

Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems

Authors: Guangjing Wang, Ce Zhou, Yuanda Wang, Bocheng Chen, Hanqing Guo, Qiben Yan | Published: 2023-11-20
Prompt Injection
Poisoning
Transfer Learning

Machine learning-based malware detection for IoT devices using control-flow data

Authors: Gergely Hevesi | Published: 2023-11-20
Smart Healthcare
Network Threat Detection
Label

Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks

Authors: Evan Rose, Fnu Suya, David Evans | Published: 2023-11-20
Subpopulation Characteristics
Backdoor Attack
Poisoning Attack

Assessing Prompt Injection Risks in 200+ Custom GPTs

Authors: Jiahao Yu, Yuhang Wu, Dong Shu, Mingyu Jin, Sabrina Yang, Xinyu Xing | Published: 2023-11-20 | Updated: 2024-05-25
Prompt Injection
Prompt leaking
Dialogue System

Token-Level Adversarial Prompt Detection Based on Perplexity Measures and Contextual Information

Authors: Zhengmian Hu, Gang Wu, Saayan Mitra, Ruiyi Zhang, Tong Sun, Heng Huang, Viswanathan Swaminathan | Published: 2023-11-20 | Updated: 2024-02-18
Prompt Injection
Prompt validation
Robustness Evaluation