Backdoor Attack

PoisonBench: Assessing Large Language Model Vulnerability to Data Poisoning

Authors: Tingchen Fu, Mrinank Sharma, Philip Torr, Shay B. Cohen, David Krueger, Fazl Barez | Published: 2024-10-11
LLM Performance Evaluation
Backdoor Attack
Poisoning

CAT: Concept-level backdoor ATtacks for Concept Bottleneck Models

Authors: Songning Lai, Jiayu Yang, Yu Huang, Lijie Hu, Tianlang Xue, Zhangyi Hu, Jiaxu Li, Haicheng Liao, Yutao Yue | Published: 2024-10-07
Backdoor Attack
Poisoning

A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models

Authors: Beatrice Casey, Joanna C. S. Santos, Mehdi Mirakhorli | Published: 2024-10-06
Cybersecurity
Backdoor Attack

ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs

Authors: Lu Yan, Siyuan Cheng, Xuan Chen, Kaiyuan Zhang, Guangyu Shen, Zhuo Zhang, Xiangyu Zhang | Published: 2024-10-05
Negative Training
Backdoor Attack
Prompt Injection

Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents

Authors: Hanrong Zhang, Jingyuan Huang, Kai Mei, Yifei Yao, Zhenting Wang, Chenlu Zhan, Hongwei Wang, Yongfeng Zhang | Published: 2024-10-03 | Updated: 2025-04-16
Backdoor Attack
Prompt Injection

Empirical Perturbation Analysis of Linear System Solvers from a Data Poisoning Perspective

Authors: Yixin Liu, Arielle Carr, Lichao Sun | Published: 2024-10-01
Backdoor Attack
Poisoning
Linear Solver

Timber! Poisoning Decision Trees

Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01
Backdoor Attack
Poisoning

Weak-to-Strong Backdoor Attack for Large Language Models

Authors: Shuai Zhao, Leilei Gan, Zhongliang Guo, Xiaobao Wu, Luwei Xiao, Xiaoyu Xu, Cong-Duy Nguyen, Luu Anh Tuan | Published: 2024-09-26 | Updated: 2024-10-13
Backdoor Attack
Prompt Injection

SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning

Authors: Minyeong Choe, Cheolhee Park, Changho Seo, Hyunil Kim | Published: 2024-09-23 | Updated: 2025-07-30
Backdoor Attack
Poisoning
Watermark Robustness

Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm

Authors: Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin | Published: 2024-09-21 | Updated: 2024-10-06
Backdoor Attack
Model Performance Evaluation
Defense Method