Evaluating Membership Inference Attacks in heterogeneous-data setups Authors: Bram van Dartel, Marc Damie, Florian Hahn | Published: 2025-02-26 | Updated: 2025-04-28 Dataset GenerationPrivacy ProtectionAttack Type 2025.02.26 2025.05.27 Literature Database
SQL Injection Jailbreak: A Structural Disaster of Large Language Models Authors: Jiawei Zhao, Kejiang Chen, Weiming Zhang, Nenghai Yu | Published: 2024-11-03 | Updated: 2025-05-21 Prompt InjectionPrompt leakingAttack Type 2024.11.03 2025.05.28 Literature Database
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems Authors: Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim | Published: 2022-07-11 PoisoningAttack TypeAdversarial Learning 2022.07.11 2025.05.28 Literature Database
Process Mining Algorithm for Online Intrusion Detection System Authors: Yinzheng Zhong, John Y. Goulermas, Alexei Lisitsa | Published: 2022-05-24 Data CollectionNetwork Threat DetectionAttack Type 2022.05.24 2025.05.28 Literature Database
Focused Adversarial Attacks Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19 Attack Methods against DFLAttack TypeAdversarial Example 2022.05.19 2025.05.28 Literature Database
A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12 Attack Methods against DFLCyber ThreatAttack Type 2022.05.01 2025.05.28 Literature Database
Adversarial attacks on an optical neural network Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29 Cyber ThreatAttack TypeImage Feature Extraction 2022.04.29 2025.05.28 Literature Database
Backdooring Explainable Machine Learning Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20 Backdoor AttackAttack TypeExplainability 2022.04.20 2025.05.28 Literature Database
Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19 User Behavior AnalysisAttack TypeMachine Learning Method 2022.04.19 2025.05.28 Literature Database
Machine Learning Security against Data Poisoning: Are We There Yet? Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo | Published: 2022-04-12 | Updated: 2024-03-08 PoisoningAttack TypeDefense Method 2022.04.12 2025.05.28 Literature Database