A novel reliability attack of Physical Unclonable Functions Authors: Gaoxiang Li, Yu Zhuang | Published: 2024-05-21 | Updated: 2024-06-07 FPGAExperimental ValidationAttack Method 2024.05.21 2025.05.27 Literature Database
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction Authors: Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti | Published: 2024-05-20 Model Performance EvaluationAttack EvaluationAttack Method 2024.05.20 2025.05.27 Literature Database
Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy Authors: Yichuan Shi, Olivera Kotevska, Viktor Reshniak, Abhishek Singh, Ramesh Raskar | Published: 2024-05-16 PoisoningAttack MethodDefense Method 2024.05.16 2025.05.27 Literature Database
Adversarial Machine Learning Threats to Spacecraft Authors: Rajiv Thummala, Shristi Sharma, Matteo Calabrese, Gregory Falco | Published: 2024-05-14 CybersecurityPoisoningAttack Method 2024.05.14 2025.05.27 Literature Database
Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM Authors: Xikang Yang, Xuehai Tang, Songlin Hu, Jizhong Han | Published: 2024-05-09 LLM SecurityPrompt InjectionAttack Method 2024.05.09 2025.05.27 Literature Database
Revisiting Character-level Adversarial Attacks for Language Models Authors: Elias Abad Rocamora, Yongtao Wu, Fanghui Liu, Grigorios G. Chrysos, Volkan Cevher | Published: 2024-05-07 | Updated: 2024-09-04 WatermarkingLoss FunctionAttack Method 2024.05.07 2025.05.27 Literature Database
Boosting Jailbreak Attack with Momentum Authors: Yihao Zhang, Zeming Wei | Published: 2024-05-02 WatermarkingPrompt InjectionAttack Method 2024.05.02 2025.05.27 Literature Database
Attacks on Third-Party APIs of Large Language Models Authors: Wanru Zhao, Vidit Khazanchi, Haodi Xing, Xuanli He, Qiongkai Xu, Nicholas Donald Lane | Published: 2024-04-24 LLM SecurityPrompt InjectionAttack Method 2024.04.24 2025.05.27 Literature Database
MISLEAD: Manipulating Importance of Selected features for Learning Epsilon in Evasion Attack Deception Authors: Vidit Khazanchi, Pavan Kulkarni, Yuvaraj Govindarajulu, Manojkumar Parmar | Published: 2024-04-24 | Updated: 2024-05-02 Model InterpretabilityAttack MethodAdversarial Training 2024.04.24 2025.05.27 Literature Database
Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15 DDoS Attack DetectionAttack MethodAdversarial Example 2024.04.15 2025.05.27 Literature Database