Prompt Injection

DNS based In-Browser Cryptojacking Detection

Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2022-05-10
Performance Evaluation
Prompt Injection
Attack Detection

StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection

Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24
Prompt Injection
Model Selection Method
Defense Method

Examining Zero-Shot Vulnerability Repair with Large Language Models

Authors: Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt | Published: 2021-12-03 | Updated: 2022-08-15
Program Interpretation Graph
Prompt Injection
Automated Vulnerability Remediation

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03
Prompt Injection
Malware Detection Method
Adversarial Attack Methods

Teacher Model Fingerprinting Attacks Against Transfer Learning

Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23
Watermarking
Data Collection
Prompt Injection

Bad Characters: Imperceptible NLP Attacks

Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2021-06-18 | Updated: 2021-12-11
Cyber Attack
Prompt Injection
Machine Learning Application

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15
Prompt Injection
Attack Type
Defense Method

To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers

Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08
Prompt Injection
Membership Inference
Adversarial Learning

Piracy Resistant Watermarks for Deep Neural Networks

Authors: Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng | Published: 2019-10-02 | Updated: 2020-12-02
Prompt Injection
Membership Inference
Attack Evaluation

Local Differential Privacy for Deep Learning

Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman | Published: 2019-08-08 | Updated: 2019-11-09
Privacy Enhancing Technology
Prompt Injection
Privacy Protection in Machine Learning