HoneypotNet: Backdoor Attacks Against Model Extraction Authors: Yixu Wang, Tianle Gu, Yan Teng, Yingchun Wang, Xingjun Ma | Published: 2025-01-02 Backdoor AttackModel Extraction Attack 2025.01.02 2025.05.27 Literature Database
CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers Authors: Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He | Published: 2024-12-26 | Updated: 2025-03-31 LLM SecurityBackdoor AttackVulnerability of Adversarial Examples 2024.12.26 2025.05.27 Literature Database
A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification Authors: Yuan Ma, Xu Ma, Jiankang Wei, Jinmeng Tang, Xiaoyu Zhang, Yilun Lyu, Kehao Chen, Jingtong Huang | Published: 2024-12-22 | Updated: 2025-01-06 Backdoor AttackPoisoning 2024.12.22 2025.05.27 Literature Database
PoisonBench: Assessing Large Language Model Vulnerability to Data Poisoning Authors: Tingchen Fu, Mrinank Sharma, Philip Torr, Shay B. Cohen, David Krueger, Fazl Barez | Published: 2024-10-11 LLM Performance EvaluationBackdoor AttackPoisoning 2024.10.11 2025.05.27 Literature Database
CAT: Concept-level backdoor ATtacks for Concept Bottleneck Models Authors: Songning Lai, Jiayu Yang, Yu Huang, Lijie Hu, Tianlang Xue, Zhangyi Hu, Jiaxu Li, Haicheng Liao, Yutao Yue | Published: 2024-10-07 Backdoor AttackPoisoning 2024.10.07 2025.05.27 Literature Database
A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models Authors: Beatrice Casey, Joanna C. S. Santos, Mehdi Mirakhorli | Published: 2024-10-06 CybersecurityBackdoor Attack 2024.10.06 2025.05.27 Literature Database
ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs Authors: Lu Yan, Siyuan Cheng, Xuan Chen, Kaiyuan Zhang, Guangyu Shen, Zhuo Zhang, Xiangyu Zhang | Published: 2024-10-05 Negative TrainingBackdoor AttackPrompt Injection 2024.10.05 2025.05.27 Literature Database
Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents Authors: Hanrong Zhang, Jingyuan Huang, Kai Mei, Yifei Yao, Zhenting Wang, Chenlu Zhan, Hongwei Wang, Yongfeng Zhang | Published: 2024-10-03 | Updated: 2025-04-16 Backdoor AttackPrompt Injection 2024.10.03 2025.05.27 Literature Database
Empirical Perturbation Analysis of Linear System Solvers from a Data Poisoning Perspective Authors: Yixin Liu, Arielle Carr, Lichao Sun | Published: 2024-10-01 Backdoor AttackPoisoningLinear Solver 2024.10.01 2025.05.27 Literature Database
Timber! Poisoning Decision Trees Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01 Backdoor AttackPoisoning 2024.10.01 2025.05.27 Literature Database