UIFV: Data Reconstruction Attack in Vertical Federated Learning Authors: Jirui Yang, Peng Chen, Zhihui Lu, Qiang Duan, Yubing Bao | Published: 2024-06-18 | Updated: 2025-01-14 Data Privacy AssessmentFrameworkAttack Method 2024.06.18 2025.05.27 Literature Database
Knowledge Return Oriented Prompting (KROP) Authors: Jason Martin, Kenneth Yeung | Published: 2024-06-11 LLM SecurityPrompt InjectionAttack Method 2024.06.11 2025.05.27 Literature Database
Model for Peanuts: Hijacking ML Models without Training Access is Possible Authors: Mahmoud Ghorbel, Halima Bouzidi, Ioan Marius Bilasco, Ihsen Alouani | Published: 2024-06-03 Membership InferenceAttack MethodFace Recognition System 2024.06.03 2025.05.27 Literature Database
Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data Authors: Thibault Simonetto, Salah Ghamizi, Maxime Cordy | Published: 2024-06-02 CAPGD AlgorithmAttack MethodAdversarial Training 2024.06.02 2025.05.27 Literature Database
Defensive Prompt Patch: A Robust and Interpretable Defense of LLMs against Jailbreak Attacks Authors: Chen Xiong, Xiangyu Qi, Pin-Yu Chen, Tsung-Yi Ho | Published: 2024-05-30 | Updated: 2025-06-04 DPPセット生成Prompt InjectionAttack Method 2024.05.30 2025.06.06 Literature Database
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior Authors: Shuyu Cheng, Yibo Miao, Yinpeng Dong, Xiao Yang, Xiao-Shan Gao, Jun Zhu | Published: 2024-05-29 AlgorithmAttack MethodOptimization Problem 2024.05.29 2025.05.27 Literature Database
Medical MLLM is Vulnerable: Cross-Modality Jailbreak and Mismatched Attacks on Medical Multimodal Large Language Models Authors: Xijie Huang, Xinyuan Wang, Hantao Zhang, Yinghao Zhu, Jiawen Xi, Jingkun An, Hao Wang, Hao Liang, Chengwei Pan | Published: 2024-05-26 | Updated: 2024-08-21 Prompt InjectionThreats of Medical AIAttack Method 2024.05.26 2025.05.27 Literature Database
Visual-RolePlay: Universal Jailbreak Attack on MultiModal Large Language Models via Role-playing Image Character Authors: Siyuan Ma, Weidi Luo, Yu Wang, Xiaogeng Liu | Published: 2024-05-25 | Updated: 2024-06-12 LLM SecurityPrompt InjectionAttack Method 2024.05.25 2025.05.27 Literature Database
A novel reliability attack of Physical Unclonable Functions Authors: Gaoxiang Li, Yu Zhuang | Published: 2024-05-21 | Updated: 2024-06-07 FPGAExperimental ValidationAttack Method 2024.05.21 2025.05.27 Literature Database
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction Authors: Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti | Published: 2024-05-20 Model Performance EvaluationAttack EvaluationAttack Method 2024.05.20 2025.05.27 Literature Database