Automated Static Vulnerability Detection via a Holistic Neuro-symbolic Approach Authors: Penghui Li, Songchen Yao, Josef Sarfati Korich, Changhua Luo, Jianjia Yu, Yinzhi Cao, Junfeng Yang | Published: 2025-04-22 | Updated: 2025-04-23 Query Generation MethodPrompt InjectionVulnerability detection 2025.04.22 2025.05.27 Literature Database
BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models Authors: Jiaqi Xue, Mengxin Zheng, Yebowen Hu, Fei Liu, Xun Chen, Qian Lou | Published: 2024-06-03 | Updated: 2024-06-06 LLM Performance EvaluationQuery DiversityQuery Generation Method 2024.06.03 2025.05.27 Literature Database
ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10 Query Generation MethodFingerprinting MethodPrompt Injection 2024.05.03 2025.05.27 Literature Database
Tree of Attacks: Jailbreaking Black-Box LLMs Automatically Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31 Query Generation MethodPrompt InjectionWatermark Evaluation 2023.12.04 2025.05.28 Literature Database
DualCF: Efficient Model Extraction Attack from Counterfactual Explanations Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13 Attack Methods against DFLQuery Generation MethodAttack Method 2022.05.13 2025.05.28 Literature Database
Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks Authors: Francesco Croce, Maksym Andriushchenko, Naman D. Singh, Nicolas Flammarion, Matthias Hein | Published: 2020-06-23 | Updated: 2022-02-08 Query Generation MethodReinforcement LearningAdversarial Attack Methods 2020.06.23 2025.05.28 Literature Database
Simple Black-box Adversarial Attacks Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15 Query Generation MethodPerformance Evaluation MethodAdversarial Training 2019.05.17 2025.05.28 Literature Database
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18 Query Generation MethodPoisoningOptimization Methods 2019.05.16 2025.05.28 Literature Database
Query-Efficient Black-Box Attack by Active Learning Authors: Pengcheng Li, Jinfeng Yi, Lijun Zhang | Published: 2018-09-13 Query Generation MethodCertified RobustnessAdversarial attack 2018.09.13 2025.05.28 Literature Database
Towards Query Efficient Black-box Attacks: An Input-free Perspective Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09 Query Generation MethodTrigger DetectionPoisoning 2018.09.09 2025.05.28 Literature Database