AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns Authors: Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta | Published: 2024-02-15 Abuse of AI ChatbotsCyber AttackPrompt Injection 2024.02.15 2025.05.27 Literature Database
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13 O-RAN SecurityCyber AttackAdversarial Attack Detection 2024.02.10 2025.05.27 Literature Database
LLM Agents can Autonomously Hack Websites Authors: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang | Published: 2024-02-06 | Updated: 2024-02-16 Website VulnerabilityCyber AttackPrompt Injection 2024.02.06 2025.05.27 Literature Database
Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously Authors: Yihan Wang, Yifan Zhu, Xiao-Shan Gao | Published: 2024-02-06 Cyber AttackPoisoningAdversarial Training 2024.02.06 2025.05.27 Literature Database
L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22 AlgorithmWatermarkingCyber Attack 2024.01.27 2025.05.27 Literature Database
Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN Authors: Bruno Missi Xavier, Merim Dzaferagic, Irene Vilà, Magnos Martinello, Marco Ruffini | Published: 2024-01-17 O-RAN SecurityCyber AttackData Collection 2024.01.17 2025.05.27 Literature Database
ADMIn: Attacks on Dataset, Model and Input. A Threat Model for AI Based Software Authors: Vimal Kumar, Juliette Mayo, Khadija Bahiss | Published: 2024-01-15 Cyber AttackModel Performance EvaluationThreat modeling 2024.01.15 2025.05.27 Literature Database
Jatmo: Prompt Injection Defense by Task-Specific Finetuning Authors: Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David Wagner | Published: 2023-12-29 | Updated: 2024-01-08 LLM SecurityCyber AttackPrompt Injection 2023.12.29 2025.05.27 Literature Database
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models Authors: Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan | Published: 2023-12-18 Cyber AttackPrompt InjectionAttack Method 2023.12.18 2025.05.27 Literature Database
Model Extraction Attacks Revisited Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08 Cyber AttackModel Extraction AttackAdversarial attack 2023.12.08 2025.05.28 Literature Database