Literature Database

SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning

Authors: Minyeong Choe, Cheolhee Park, Changho Seo, Hyunil Kim | Published: 2024-09-23 | Updated: 2025-07-30
Backdoor Attack
Poisoning
Watermark Robustness

Pretraining Data Detection for Large Language Models: A Divergence-based Calibration Method

Authors: Weichao Zhang, Ruqing Zhang, Jiafeng Guo, Maarten de Rijke, Yixing Fan, Xueqi Cheng | Published: 2024-09-23 | Updated: 2025-05-21
Disabling Safety Mechanisms of LLM
Model Performance Evaluation
Information Extraction

Order of Magnitude Speedups for LLM Membership Inference

Authors: Rongting Zhang, Martin Bertran, Aaron Roth | Published: 2024-09-22 | Updated: 2024-09-24
LLM Security
Membership Inference
Low-Cost Membership Inference Method

PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach

Authors: Zhihao Lin, Wei Ma, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Yang Liu, Jun Wang, Li Li | Published: 2024-09-21 | Updated: 2024-10-03
LLM Performance Evaluation
Prompt Injection

Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm

Authors: Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin | Published: 2024-09-21 | Updated: 2024-10-06
Backdoor Attack
Model Performance Evaluation
Defense Method

On the Feasibility of Fully AI-automated Vishing Attacks

Authors: João Figueiredo, Afonso Carvalho, Daniel Castro, Daniel Gonçalves, Nuno Santos | Published: 2024-09-20 | Updated: 2025-06-16
AIを用いた詐欺手法
Participant Question Analysis
Speech Synthesis Technology

MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning

Authors: Jiliang Li, Yifan Zhang, Yu Huang, Kevin Leach | Published: 2024-09-20 | Updated: 2025-04-17
Data Augmentation Method
Poisoning
Malware Detection with Limited Samples

Extracting Memorized Training Data via Decomposition

Authors: Ellen Su, Anu Vellore, Amy Chang, Raffaele Mura, Blaine Nelson, Paul Kassianik, Amin Karbasi | Published: 2024-09-18 | Updated: 2024-10-01
Training Data Extraction Method
Prompting Strategy
Model Performance Evaluation

Artemis: Efficient Commit-and-Prove SNARKs for zkML

Authors: Hidde Lycklama, Alexander Viand, Nikolay Avramov, Nicolas Küchler, Anwar Hithnawi | Published: 2024-09-18
Framework
Model Performance Evaluation
Cryptography

Hard-Label Cryptanalytic Extraction of Neural Network Models

Authors: Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang | Published: 2024-09-18
Model Extraction Attack
Attack Method
Computational Complexity