F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14 Prompt InjectionAttack EvaluationAttack Method 2024.10.11 2025.05.27 Literature Database
Study of Attacks on the HHL Quantum Algorithm Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10 CybersecurityAttack EvaluationAttack Method 2024.10.10 2025.05.27 Literature Database
Robustness Reprogramming for Representation Learning Authors: Zhichao Hou, MohamadAli Torkamani, Hamid Krim, Xiaorui Liu | Published: 2024-10-06 Attack EvaluationDefense Method 2024.10.06 2025.05.27 Literature Database
TA3: Testing Against Adversarial Attacks on Machine Learning Models Authors: Yuanzhe Jin, Min Chen | Published: 2024-10-06 Attack Evaluation 2024.10.06 2025.05.27 Literature Database
Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis Authors: Zhipeng He, Chun Ouyang, Laith Alzubaidi, Alistair Barros, Catarina Moreira | Published: 2024-07-16 | Updated: 2024-10-04 Model Performance EvaluationAttack EvaluationFeature Interdependence 2024.07.16 2025.05.27 Literature Database
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction Authors: Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti | Published: 2024-05-20 Model Performance EvaluationAttack EvaluationAttack Method 2024.05.20 2025.05.27 Literature Database
Manipulating hidden-Markov-model inferences by corrupting batch data Authors: William N. Caballero, Jose Manuel Camacho, Tahir Ekin, Roi Naveiro | Published: 2024-02-19 Quantification of UncertaintyAttack EvaluationAttack Method 2024.02.19 2025.05.27 Literature Database
On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15 Dataset GenerationIntrusion Detection SystemAttack Evaluation 2024.02.15 2025.05.27 Literature Database
A Novel Evaluation Framework for Assessing Resilience Against Prompt Injection Attacks in Large Language Models Authors: Daniel Wankit Yip, Aysan Esmradi, Chun Fai Chan | Published: 2024-01-02 LLM SecurityPrompt InjectionAttack Evaluation 2024.01.02 2025.05.27 Literature Database
Label-Only Model Inversion Attacks via Knowledge Transfer Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30 Privacy TechniqueAttack EvaluationDeep Learning Method 2023.10.30 2025.05.28 Literature Database