Taxonomy of Attacks

Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models

Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo | Published: 2025-05-06
Prompt leaking
Attack Type
Taxonomy of Attacks

InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents

Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang | Published: 2024-03-05 | Updated: 2024-08-04
Indirect Prompt Injection
Taxonomy of Attacks
Vulnerability Analysis

Watermark Stealing in Large Language Models

Authors: Nikola Jovanović, Robin Staab, Martin Vechev | Published: 2024-02-29 | Updated: 2024-06-24
Model Extraction Attack
Large Language Model
Taxonomy of Attacks

How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications

Authors: Jiong Zhu, Junchen Jin, Donald Loveland, Michael T. Schaub, Danai Koutra | Published: 2021-06-14 | Updated: 2022-07-23
Dataset evaluation
Model Design and Accuracy
Taxonomy of Attacks

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
Dataset evaluation
Intrusion Detection System
Taxonomy of Attacks

Exacerbating Algorithmic Bias through Fairness Attacks

Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16
Taxonomy of Attacks
Adversarial Attack Methods
Role of Machine Learning

GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10
Dataset evaluation
Taxonomy of Attacks
Role of Machine Learning

Composite Adversarial Attacks

Authors: Xiaofeng Mao, Yuefeng Chen, Shuhui Wang, Hang Su, Yuan He, Hui Xue | Published: 2020-12-10
Taxonomy of Attacks
Adversarial Attack Methods
Defense Mechanism

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization

Authors: Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan | Published: 2020-10-24 | Updated: 2021-11-30
Taxonomy of Attacks
Attack Method
Knowledge Graph

A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid

Authors: Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch | Published: 2019-12-31
Model Selection Method
Taxonomy of Attacks
Automated Intrusion Detection System