Deceptive Fairness Attacks on Graphs via Meta Learning Authors: Jian Kang, Yinglong Xia, Ross Maciejewski, Jiebo Luo, Hanghang Tong | Published: 2023-10-24 Graph Neural NetworkAttack Methodevaluation metrics 2023.10.24 2025.05.28 Literature Database
AutoDAN: Interpretable Gradient-Based Adversarial Attacks on Large Language Models Authors: Sicheng Zhu, Ruiyi Zhang, Bang An, Gang Wu, Joe Barrow, Zichao Wang, Furong Huang, Ani Nenkova, Tong Sun | Published: 2023-10-23 | Updated: 2023-12-14 Prompt InjectionSafety AlignmentAttack Method 2023.10.23 2025.05.28 Literature Database
A Comprehensive Study of Privacy Risks in Curriculum Learning Authors: Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li | Published: 2023-10-16 Membership InferenceModel Performance EvaluationAttack Method 2023.10.16 2025.05.28 Literature Database
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14 Trigger DetectionBackdoor DetectionAttack Method 2023.08.26 2025.05.28 Literature Database
Why Don’t You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations Authors: Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia | Published: 2023-07-24 | Updated: 2023-07-27 Attack MethodAdversarial ExamplePhysical attack 2023.07.24 2025.05.28 Literature Database
LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20 Security AnalysisProgram VerificationAttack Method 2023.07.20 2025.05.28 Literature Database
Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats Authors: Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu | Published: 2023-06-13 | Updated: 2023-06-14 APT Defense TechniquesAttack MethodMalware Detection with Limited Samples 2023.06.13 2025.05.28 Literature Database
Zero-Day Threats Detection for Critical Infrastructures Authors: Mike Nkongolo, Mahmut Tokmak | Published: 2023-06-10 Random ForestAttack MethodStatistical Methods 2023.06.10 2025.05.28 Literature Database
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09 Attack MethodAdversarial TrainingBehavior Analysis Method 2023.06.09 2025.05.28 Literature Database
Adversarial attacks and defenses in explainable artificial intelligence: A survey Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13 Membership InferenceAttack MethodAdversarial Example 2023.06.06 2025.05.28 Literature Database