LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14 Trigger DetectionBackdoor DetectionAttack Method 2023.08.26 2025.05.28 Literature Database
Why Don’t You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations Authors: Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia | Published: 2023-07-24 | Updated: 2023-07-27 Attack MethodAdversarial ExamplePhysical attack 2023.07.24 2025.05.28 Literature Database
LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20 Security AnalysisProgram VerificationAttack Method 2023.07.20 2025.05.28 Literature Database
Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats Authors: Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu | Published: 2023-06-13 | Updated: 2023-06-14 APT Defense TechniquesAttack MethodMalware Detection with Limited Samples 2023.06.13 2025.05.28 Literature Database
Zero-Day Threats Detection for Critical Infrastructures Authors: Mike Nkongolo, Mahmut Tokmak | Published: 2023-06-10 Random ForestAttack MethodStatistical Methods 2023.06.10 2025.05.28 Literature Database
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09 Attack MethodAdversarial TrainingBehavior Analysis Method 2023.06.09 2025.05.28 Literature Database
Adversarial attacks and defenses in explainable artificial intelligence: A survey Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13 Membership InferenceAttack MethodAdversarial Example 2023.06.06 2025.05.28 Literature Database
Evaluating Privacy Leakage in Split Learning Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19 Privacy ViolationPrivacy Protection MethodAttack Method 2023.05.22 2025.05.28 Literature Database
Network Cascade Vulnerability using Constrained Bayesian Optimization Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05 Cyber AttackHyperparameter TuningAttack Method 2023.04.27 2025.05.28 Literature Database
Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04 Cyber AttackPrivacy Enhancing TechnologyAttack Method 2023.04.04 2025.05.28 Literature Database