Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-22 Prompt leakingPsychological ManipulationAdversarial Attack Methods 2025.07.22 2025.07.24 Literature Database
Attacking interpretable NLP systems Authors: Eldor Abdukhamidov, Tamer Abuhmed, Joanna C. S. Santos, Mohammed Abuhamad | Published: 2025-07-22 Prompt InjectionPrompt validationAdversarial Attack Methods 2025.07.22 2025.07.24 Literature Database
Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection Authors: Ziqi Miao, Yi Ding, Lijun Li, Jing Shao | Published: 2025-07-03 Prompt InjectionModel DoSAdversarial Attack Methods 2025.07.03 2025.07.05 Literature Database
Weakest Link in the Chain: Security Vulnerabilities in Advanced Reasoning Models Authors: Arjun Krishna, Aaditya Rastogi, Erick Galinkin | Published: 2025-06-16 Prompt InjectionLarge Language ModelAdversarial Attack Methods 2025.06.16 2025.06.18 Literature Database
TokenBreak: Bypassing Text Classification Models Through Token Manipulation Authors: Kasimir Schulz, Kenneth Yeung, Kieran Evans | Published: 2025-06-09 Adversarial Attack MethodsDefense Method 2025.06.09 2025.06.11 Literature Database
Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09 Certified RobustnessRobust OptimizationAdversarial Attack Methods 2025.06.09 2025.06.11 Literature Database
A Review of Adversarial Attacks in Computer Vision Authors: Yutong Zhang, Yao Li, Yin Li, Zhichang Guo | Published: 2023-08-15 PoisoningAdversarial Attack MethodsDefense Method 2023.08.15 2025.05.28 Literature Database
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning Authors: Simon Queyrut, Yérom-David Bromberg, Valerio Schiavoni | Published: 2023-08-08 WatermarkingAdversarial Attack MethodsDefense Method 2023.08.08 2025.05.28 Literature Database
A reading survey on adversarial machine learning: Adversarial attacks and their understanding Authors: Shashank Kotyan | Published: 2023-08-07 Adversarial ExampleAdversarial Attack MethodsDefense Method 2023.08.07 2025.05.28 Literature Database
Label Inference Attacks against Node-level Vertical Federated GNNs Authors: Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu | Published: 2023-08-04 | Updated: 2024-04-18 PoisoningAdversarial Attack MethodsFederated Learning 2023.08.04 2025.05.28 Literature Database