Literature Database

Trojan Activation Attack: Red-Teaming Large Language Models using Activation Steering for Safety-Alignment

Authors: Haoran Wang, Kai Shu | Published: 2023-11-15 | Updated: 2024-08-15
Prompt Injection
Attack Method
Natural Language Processing

Are Normalizing Flows the Key to Unlocking the Exponential Mechanism?

Authors: Robert A. Bridges, Vandy J. Tombs, Christopher B. Stanley | Published: 2023-11-15 | Updated: 2024-06-11
Privacy Protection
Convergence Property
Machine Learning Method

Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts

Authors: Yuanwei Wu, Xiang Li, Yixin Liu, Pan Zhou, Lichao Sun | Published: 2023-11-15 | Updated: 2024-01-20
Prompt Injection
Attack Method
Face Recognition

A Robust Semantics-based Watermark for Large Language Model against Paraphrasing

Authors: Jie Ren, Han Xu, Yiding Liu, Yingqian Cui, Shuaiqiang Wang, Dawei Yin, Jiliang Tang | Published: 2023-11-15 | Updated: 2024-04-01
Prompt Injection
Robustness Evaluation
Information Hiding Techniques

KnowSafe: Combined Knowledge and Data Driven Hazard Mitigation in Artificial Pancreas Systems

Authors: Xugui Zhou, Maxfield Kouzel, Chloe Smith, Homa Alemzadeh | Published: 2023-11-13
Control Model of CPS
Control Action Generation
Risk Prediction and Mitigation

Adversarial Purification for Data-Driven Power System Event Classifiers with Diffusion Models

Authors: Yuanbin Cheng, Koji Yamashita, Jim Follum, Nanpeng Yu | Published: 2023-11-13
Adversarial Text Purification
Optimization Problem
Defense Method

Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks

Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11
Improvement of Learning
Deep Learning Method
Defense Method

Does Differential Privacy Prevent Backdoor Attacks in Practice?

Authors: Fereshteh Razmi, Jian Lou, Li Xiong | Published: 2023-11-10
Data Privacy Assessment
Trade-off Analysis
Defense Method

Watermarking Vision-Language Pre-trained Models for Multi-modal Embedding as a Service

Authors: Yuanmin Tang, Jing Yu, Keke Gai, Xiangyan Qu, Yue Hu, Gang Xiong, Qi Wu | Published: 2023-11-10
Data Privacy Assessment
Membership Inference
Copyright Trap

RAGLog: Log Anomaly Detection using Retrieval Augmented Generation

Authors: Jonathan Pan, Swee Liang Wong, Yidi Yuan | Published: 2023-11-09
Clustering methods
Class Imbalance
Challenges of Log Analysis