Attack Method

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14
Trigger Detection
Backdoor Detection
Attack Method

Why Don’t You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations

Authors: Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia | Published: 2023-07-24 | Updated: 2023-07-27
Attack Method
Adversarial Example
Physical attack

LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?

Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20
Security Analysis
Program Verification
Attack Method

Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats

Authors: Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu | Published: 2023-06-13 | Updated: 2023-06-14
APT Defense Techniques
Attack Method
Malware Detection with Limited Samples

Zero-Day Threats Detection for Critical Infrastructures

Authors: Mike Nkongolo, Mahmut Tokmak | Published: 2023-06-10
Random Forest
Attack Method
Statistical Methods

Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions

Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09
Attack Method
Adversarial Training
Behavior Analysis Method

Adversarial attacks and defenses in explainable artificial intelligence: A survey

Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13
Membership Inference
Attack Method
Adversarial Example

Evaluating Privacy Leakage in Split Learning

Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19
Privacy Violation
Privacy Protection Method
Attack Method

Network Cascade Vulnerability using Constrained Bayesian Optimization

Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05
Cyber Attack
Hyperparameter Tuning
Attack Method

Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification

Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04
Cyber Attack
Privacy Enhancing Technology
Attack Method