Attack Evaluation

F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents

Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14
Prompt Injection
Attack Evaluation
Attack Method

Study of Attacks on the HHL Quantum Algorithm

Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10
Cybersecurity
Attack Evaluation
Attack Method

Robustness Reprogramming for Representation Learning

Authors: Zhichao Hou, MohamadAli Torkamani, Hamid Krim, Xiaorui Liu | Published: 2024-10-06
Attack Evaluation
Defense Method

TA3: Testing Against Adversarial Attacks on Machine Learning Models

Authors: Yuanzhe Jin, Min Chen | Published: 2024-10-06
Attack Evaluation

Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis

Authors: Zhipeng He, Chun Ouyang, Laith Alzubaidi, Alistair Barros, Catarina Moreira | Published: 2024-07-16 | Updated: 2024-10-04
Model Performance Evaluation
Attack Evaluation
Feature Interdependence

GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

Authors: Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti | Published: 2024-05-20
Model Performance Evaluation
Attack Evaluation
Attack Method

Manipulating hidden-Markov-model inferences by corrupting batch data

Authors: William N. Caballero, Jose Manuel Camacho, Tahir Ekin, Roi Naveiro | Published: 2024-02-19
Quantification of Uncertainty
Attack Evaluation
Attack Method

On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection

Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15
Dataset Generation
Intrusion Detection System
Attack Evaluation

A Novel Evaluation Framework for Assessing Resilience Against Prompt Injection Attacks in Large Language Models

Authors: Daniel Wankit Yip, Aysan Esmradi, Chun Fai Chan | Published: 2024-01-02
LLM Security
Prompt Injection
Attack Evaluation

Label-Only Model Inversion Attacks via Knowledge Transfer

Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30
Privacy Technique
Attack Evaluation
Deep Learning Method