Merge Hijacking: Backdoor Attacks to Model Merging of Large Language Models Authors: Zenghui Yuan, Yangming Xu, Jiawen Shi, Pan Zhou, Lichao Sun | Published: 2025-05-29 LLM SecurityPoisoning AttackModel Protection Methods 2025.05.29 2025.05.31 Literature Database
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models Authors: Yujin Huang, Zhi Zhang, Qingchuan Zhao, Xingliang Yuan, Chunyang Chen | Published: 2025-03-31 Prompt leakingModel Protection MethodsModel Extraction Attack 2025.03.31 2025.05.27 Literature Database
Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications Authors: Aryan Verma | Published: 2021-09-06 AlgorithmModel Protection MethodsEncryption Technology 2021.09.06 2025.05.28 Literature Database
Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29 Model Protection MethodsVulnerability of Adversarial ExamplesDefense Mechanism 2021.03.29 2025.05.28 Literature Database
Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26 Model Protection MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.26 2025.05.28 Literature Database
Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses Authors: Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein | Published: 2020-12-18 | Updated: 2021-03-31 Backdoor AttackPoisoningModel Protection Methods 2020.12.18 2025.05.28 Literature Database
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22 Side-Channel AttackModel Protection MethodsModel Extraction Attack 2018.10.22 2025.05.28 Literature Database