Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks Authors: Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh | Published: 2023-10-16 Prompt InjectionAdversarial ExampleAdversarial Training 2023.10.16 2025.05.28 Literature Database
BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen | Published: 2023-10-14 Attack EvaluationAdversarial ExampleOptimization Methods 2023.10.14 2025.05.28 Literature Database
Misusing Tools in Large Language Models With Visual Adversarial Examples Authors: Xiaohan Fu, Zihan Wang, Shuheng Li, Rajesh K. Gupta, Niloofar Mireshghallah, Taylor Berg-Kirkpatrick, Earlence Fernandes | Published: 2023-10-04 LLM Performance EvaluationPrompt InjectionAdversarial Example 2023.10.04 2025.05.28 Literature Database
DAD++: Improved Data-free Test Time Adversarial Defense Authors: Gaurav Kumar Nayak, Inder Khatri, Shubham Randive, Ruchit Rawal, Anirban Chakraborty | Published: 2023-09-10 Adversarial ExampleAdversarial attackDefense Method 2023.09.10 2025.05.28 Literature Database
Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities Authors: Maximilian Mozes, Xuanli He, Bennett Kleinberg, Lewis D. Griffin | Published: 2023-08-24 Prompt InjectionMalicious Content GenerationAdversarial Example 2023.08.24 2025.05.28 Literature Database
Sample Complexity of Robust Learning against Evasion Attacks Authors: Pascale Gourdeau | Published: 2023-08-23 Sample ComplexityPoisoningAdversarial Example 2023.08.23 2025.05.28 Literature Database
A Comparison of Adversarial Learning Techniques for Malware Detection Authors: Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp | Published: 2023-08-19 Malware DetectionAdversarial ExampleAdversarial attack 2023.08.19 2025.05.28 Literature Database
Data-Free Model Extraction Attacks in the Context of Object Detection Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09 Dataset GenerationModel Extraction AttackAdversarial Example 2023.08.09 2025.05.28 Literature Database
A reading survey on adversarial machine learning: Adversarial attacks and their understanding Authors: Shashank Kotyan | Published: 2023-08-07 Adversarial ExampleAdversarial Attack MethodsDefense Method 2023.08.07 2025.05.28 Literature Database
URET: Universal Robustness Evaluation Toolkit (for Evasion) Authors: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin | Published: 2023-08-03 Data GenerationAdversarial ExampleAdversarial attack 2023.08.03 2025.05.28 Literature Database