Literature Database

Not what you’ve signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection

Authors: Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz | Published: 2023-02-23 | Updated: 2023-05-05
Indirect Prompt Injection
Prompt Injection
Malicious Prompt

PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks

Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06
DNN IP Protection Method
Watermarking
Vulnerability detection

MultiRobustBench: Benchmarking Robustness Against Multiple Attacks

Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal | Published: 2023-02-21 | Updated: 2023-07-20
DNN IP Protection Method
Poisoning
Model Performance Evaluation

Generalization Bounds for Adversarial Contrastive Learning

Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21
Watermarking
Model Performance Evaluation
Adversarial Example

Poisoning Web-Scale Training Datasets is Practical

Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06
Poisoning
Attack Scenario Analysis
Adversarial attack

WW-FL: Secure and Private Large-Scale Federated Learning

Authors: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame | Published: 2023-02-20 | Updated: 2025-10-14
Trigger Detection
Privacy Enhancing Technology
Poisoning

Certified private data release for sparse Lipschitz functions

Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28
Watermarking
Privacy Enhancing Technology
Model Performance Evaluation

Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective

Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04
Backdoor Attack
Prompt Injection
Poisoning Attack

Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data

Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18
Privacy Enhancing Technology
Model Performance Evaluation
Model Extraction Attack

Large Language Models for Code: Security Hardening and Adversarial Testing

Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16
Security Assurance
Prompt Injection
Vulnerability Analysis