SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang | Published: 2023-10-19 Membership InferenceModel Extraction AttackAttack Evaluation 2023.10.19 2025.05.28 Literature Database
Attack Prompt Generation for Red Teaming and Defending Large Language Models Authors: Boyi Deng, Wenjie Wang, Fuli Feng, Yang Deng, Qifan Wang, Xiangnan He | Published: 2023-10-19 Prompt InjectionAttack EvaluationAdversarial Example 2023.10.19 2025.05.28 Literature Database
Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17 Privacy TechniqueModel Extraction AttackAttack Evaluation 2023.10.17 2025.05.28 Literature Database
BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen | Published: 2023-10-14 Attack EvaluationAdversarial ExampleOptimization Methods 2023.10.14 2025.05.28 Literature Database
On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais | Published: 2023-10-14 Malicious Package DetectionAttack EvaluationFeature Selection Method 2023.10.14 2025.05.28 Literature Database
Catastrophic Jailbreak of Open-source LLMs via Exploiting Generation Authors: Yangsibo Huang, Samyak Gupta, Mengzhou Xia, Kai Li, Danqi Chen | Published: 2023-10-10 Prompt InjectionAttack EvaluationAdversarial attack 2023.10.10 2025.05.28 Literature Database
Test-Time Poisoning Attacks Against Test-Time Adaptation Models Authors: Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang | Published: 2023-08-16 PoisoningModel Performance EvaluationAttack Evaluation 2023.08.16 2025.05.28 Literature Database
Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16 Security AssuranceAttack EvaluationWatermark Robustness 2023.08.16 2025.05.28 Literature Database
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots Authors: Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan | Published: 2023-07-14 Prompt InjectionDialogue SystemAttack Evaluation 2023.07.14 2025.05.28 Literature Database
Group-based Robustness: A General Framework for Customized Robustness in the Real World Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif | Published: 2023-06-29 | Updated: 2024-03-10 Group-Based RobustnessAttack EvaluationAdversarial Attack Detection 2023.06.29 2025.05.28 Literature Database