The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative Authors: Zhen Tan, Chengshuai Zhao, Raha Moraffah, Yifan Li, Yu Kong, Tianlong Chen, Huan Liu | Published: 2024-02-20 | Updated: 2024-06-03 LLM SecurityClassification of Malicious ActorsAttack Method 2024.02.20 2025.05.27 Literature Database
IT Intrusion Detection Using Statistical Learning and Testbed Measurements Authors: Xiaoxuan Wang, Rolf Stadler | Published: 2024-02-20 CVE Information ExtractionIntrusion Detection SystemAttack Method 2024.02.20 2025.05.27 Literature Database
Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning Authors: Shuai Zhao, Leilei Gan, Luu Anh Tuan, Jie Fu, Lingjuan Lyu, Meihuizi Jia, Jinming Wen | Published: 2024-02-19 | Updated: 2024-03-29 Backdoor DetectionAttack MethodDefense Method 2024.02.19 2025.05.27 Literature Database
Manipulating hidden-Markov-model inferences by corrupting batch data Authors: William N. Caballero, Jose Manuel Camacho, Tahir Ekin, Roi Naveiro | Published: 2024-02-19 Quantification of UncertaintyAttack EvaluationAttack Method 2024.02.19 2025.05.27 Literature Database
FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning Authors: Enrique Mármol Campos, Aurora González Vidal, José Luis Hernández Ramos, Antonio Skarmeta | Published: 2024-02-15 PoisoningAttack MethodFederated Learning 2024.02.15 2025.05.27 Literature Database
PAL: Proxy-Guided Black-Box Attack on Large Language Models Authors: Chawin Sitawarin, Norman Mu, David Wagner, Alexandre Araujo | Published: 2024-02-15 LLM SecurityPrompt InjectionAttack Method 2024.02.15 2025.05.27 Literature Database
Test-Time Backdoor Attacks on Multimodal Large Language Models Authors: Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin | Published: 2024-02-13 Backdoor AttackModel Performance EvaluationAttack Method 2024.02.13 2025.05.27 Literature Database
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams | Published: 2024-01-03 CybersecurityAttack MethodTime-Related Features 2024.01.03 2025.05.27 Literature Database
Can you See me? On the Visibility of NOPs against Android Malware Detectors Authors: Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger | Published: 2023-12-28 Code Change AnalysisAttack MethodWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models Authors: Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan | Published: 2023-12-18 Cyber AttackPrompt InjectionAttack Method 2023.12.18 2025.05.27 Literature Database