Query Generation Method

Automated Static Vulnerability Detection via a Holistic Neuro-symbolic Approach

Authors: Penghui Li, Songchen Yao, Josef Sarfati Korich, Changhua Luo, Jianjia Yu, Yinzhi Cao, Junfeng Yang | Published: 2025-04-22 | Updated: 2025-04-23
Query Generation Method
Prompt Injection
Vulnerability detection

BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models

Authors: Jiaqi Xue, Mengxin Zheng, Yebowen Hu, Fei Liu, Xun Chen, Qian Lou | Published: 2024-06-03 | Updated: 2024-06-06
LLM Performance Evaluation
Query Diversity
Query Generation Method

ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models

Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10
Query Generation Method
Fingerprinting Method
Prompt Injection

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31
Query Generation Method
Prompt Injection
Watermark Evaluation

DualCF: Efficient Model Extraction Attack from Counterfactual Explanations

Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13
Attack Methods against DFL
Query Generation Method
Attack Method

Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks

Authors: Francesco Croce, Maksym Andriushchenko, Naman D. Singh, Nicolas Flammarion, Matthias Hein | Published: 2020-06-23 | Updated: 2022-02-08
Query Generation Method
Reinforcement Learning
Adversarial Attack Methods

Simple Black-box Adversarial Attacks

Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15
Query Generation Method
Performance Evaluation Method
Adversarial Training

Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization

Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18
Query Generation Method
Poisoning
Optimization Methods

Query-Efficient Black-Box Attack by Active Learning

Authors: Pengcheng Li, Jinfeng Yi, Lijun Zhang | Published: 2018-09-13
Query Generation Method
Certified Robustness
Adversarial attack

Towards Query Efficient Black-box Attacks: An Input-free Perspective

Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09
Query Generation Method
Trigger Detection
Poisoning