The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09 Poisoning attack on RAGIndirect Prompt InjectionBackdoor Detection 2025.07.09 2025.07.11 Literature Database
RawMal-TF: Raw Malware Dataset Labeled by Type and Family Authors: David Bálik, Martin Jureček, Mark Stamp | Published: 2025-06-30 Backdoor DetectionPrompt InjectionDataset for Malware Classification 2025.06.30 2025.07.02 Literature Database
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty Authors: Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, Yue Zhao | Published: 2025-06-24 Backdoor DetectionPrivacy ProtectionPrivacy protection framework 2025.06.24 2025.06.26 Literature Database
Transformers for Secure Hardware Systems: Applications, Challenges, and Outlook Authors: Banafsheh Saber Latibari, Najmeh Nazari, Avesta Sasan, Houman Homayoun, Pratik Satam, Soheil Salehi, Hossein Sayadi | Published: 2025-05-28 Security AnalysisHardware Trojan DetectionBackdoor Detection 2025.05.28 2025.05.30 Literature Database
ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models Authors: Jin Xie, Ruishi He, Songze Li, Xiaojun Jia, Shouling Ji | Published: 2025-04-29 Backdoor DetectionPrivacy ViolationAttack Method 2025.04.29 2025.05.27 Literature Database
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets Authors: Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang | Published: 2025-04-16 Backdoor DetectionImprovement of LearningEffectiveness Analysis of Defense Methods 2025.04.16 2025.05.27 Literature Database
ToxicSQL: Migrating SQL Injection Threats into Text-to-SQL Models via Backdoor Attack Authors: Meiyu Lin, Haichuan Zhang, Jiale Lao, Renyuan Li, Yuanchun Zhou, Carl Yang, Yang Cao, Mingjie Tang | Published: 2025-03-07 | Updated: 2025-04-03 Backdoor DetectionBackdoor AttackModel Performance Evaluation 2025.03.07 2025.05.27 Literature Database
ExpShield: Safeguarding Web Text from Unauthorized Crawling and Language Modeling Exploitation Authors: Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong | Published: 2024-12-30 | Updated: 2025-05-07 Text Perturbation MethodBackdoor DetectionWatermarking Technology 2024.12.30 2025.05.27 Literature Database
Unlearning Backdoor Attacks for LLMs with Weak-to-Strong Knowledge Distillation Authors: Shuai Zhao, Xiaobao Wu, Cong-Duy Nguyen, Yanhao Jia, Meihuizi Jia, Yichao Feng, Luu Anh Tuan | Published: 2024-10-18 | Updated: 2025-05-20 Backdoor DetectionBackdoor Attack TechniquesKnowledge Distillation 2024.10.18 2025.05.28 Literature Database
Infighting in the Dark: Multi-Label Backdoor Attack in Federated Learning Authors: Ye Li, Yanchao Zhao, Chengcheng Zhu, Jiale Zhang | Published: 2024-09-29 | Updated: 2025-03-22 ID Mapping ConstructionBackdoor DetectionAdversarial attack 2024.09.29 2025.05.27 Literature Database