Cyber Attack

AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns

Authors: Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta | Published: 2024-02-15
Abuse of AI Chatbots
Cyber Attack
Prompt Injection

System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks

Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13
O-RAN Security
Cyber Attack
Adversarial Attack Detection

LLM Agents can Autonomously Hack Websites

Authors: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang | Published: 2024-02-06 | Updated: 2024-02-16
Website Vulnerability
Cyber Attack
Prompt Injection

Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously

Authors: Yihan Wang, Yifan Zhu, Xiao-Shan Gao | Published: 2024-02-06
Cyber Attack
Poisoning
Adversarial Training

L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks

Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22
Algorithm
Watermarking
Cyber Attack

Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN

Authors: Bruno Missi Xavier, Merim Dzaferagic, Irene Vilà, Magnos Martinello, Marco Ruffini | Published: 2024-01-17
O-RAN Security
Cyber Attack
Data Collection

ADMIn: Attacks on Dataset, Model and Input. A Threat Model for AI Based Software

Authors: Vimal Kumar, Juliette Mayo, Khadija Bahiss | Published: 2024-01-15
Cyber Attack
Model Performance Evaluation
Threat modeling

Jatmo: Prompt Injection Defense by Task-Specific Finetuning

Authors: Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David Wagner | Published: 2023-12-29 | Updated: 2024-01-08
LLM Security
Cyber Attack
Prompt Injection

A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models

Authors: Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan | Published: 2023-12-18
Cyber Attack
Prompt Injection
Attack Method

Model Extraction Attacks Revisited

Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08
Cyber Attack
Model Extraction Attack
Adversarial attack