Weak-to-Strong Backdoor Attack for Large Language Models Authors: Shuai Zhao, Leilei Gan, Zhongliang Guo, Xiaobao Wu, Luwei Xiao, Xiaoyu Xu, Cong-Duy Nguyen, Luu Anh Tuan | Published: 2024-09-26 | Updated: 2024-10-13 Backdoor AttackPrompt Injection 2024.09.26 2025.05.27 Literature Database
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm Authors: Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin | Published: 2024-09-21 | Updated: 2024-10-06 Backdoor AttackModel Performance EvaluationDefense Method 2024.09.21 2025.05.27 Literature Database
SoK: Security and Privacy Risks of Medical AI Authors: Yuanhaur Chang, Han Liu, Evin Jaff, Chenyang Lu, Ning Zhang | Published: 2024-09-11 Backdoor AttackPrivacy ProtectionThreats of Medical AI 2024.09.11 2025.05.27 Literature Database
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20 Backdoor AttackPoisoningEvaluation Method 2024.09.08 2025.05.27 Literature Database
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? Authors: Rui Wen, Michael Backes, Yang Zhang | Published: 2024-09-05 Backdoor AttackPrivacy Protection MethodMembership Inference 2024.09.05 2025.05.27 Literature Database
Adversarial Attacks on Machine Learning-Aided Visualizations Authors: Takanori Fujiwara, Kostiantyn Kucher, Junpeng Wang, Rafael M. Martins, Andreas Kerren, Anders Ynnerman | Published: 2024-09-04 | Updated: 2024-09-24 Backdoor AttackAdversarial ExampleVulnerability of Visualization 2024.09.04 2025.05.27 Literature Database
Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural Backdoor Authors: Abdullah Arafat Miah, Yu Bi | Published: 2024-09-03 | Updated: 2024-09-09 Backdoor AttackModel Performance Evaluation 2024.09.03 2025.05.27 Literature Database
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks Authors: Ziqiang Li, Yueqi Zeng, Pengfei Xia, Lei Liu, Zhangjie Fu, Bin Li | Published: 2024-08-21 Backdoor AttackPoisoning 2024.08.21 2025.05.27 Literature Database
Transferring Backdoors between Large Language Models by Knowledge Distillation Authors: Pengzhou Cheng, Zongru Wu, Tianjie Ju, Wei Du, Zhuosheng Zhang Gongshen Liu | Published: 2024-08-19 LLM SecurityBackdoor AttackPoisoning 2024.08.19 2025.05.27 Literature Database
Compromising Embodied Agents with Contextual Backdoor Attacks Authors: Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao | Published: 2024-08-06 Backdoor AttackPrompt Injection 2024.08.06 2025.05.27 Literature Database