Structural Attack

Evaluating the Robustness of a Production Malware Detection System to Transferable Adversarial Attacks

Authors: Milad Nasr, Yanick Fratantonio, Luca Invernizzi, Ange Albertini, Loua Farah, Alex Petit-Bianco, Andreas Terzis, Kurt Thomas, Elie Bursztein, Nicholas Carlini | Published: 2025-10-02
Online Malware Detection
Adversarial Learning
Structural Attack

Bypassing Prompt Guards in Production with Controlled-Release Prompting

Authors: Jaiden Fairoze, Sanjam Garg, Keewoo Lee, Mingyuan Wang | Published: 2025-10-02
Prompt Injection
Large Language Model
Structural Attack

Phantom: General Backdoor Attacks on Retrieval Augmented Language Generation

Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Anshuman Suri, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea | Published: 2024-05-30 | Updated: 2025-10-01
Poisoning attack on RAG
Optimization Strategy
Structural Attack

Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks

Authors: Andrea Venturi, Dario Stabili, Mirco Marchetti | Published: 2024-03-18 | Updated: 2024-04-23
Intrusion Detection System
Adversarial Training
Structural Attack

AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting

Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14
Prompt Injection
Structural Attack
Defense Method

SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning

Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11
DNN IP Protection Method
Adversarial Attack Methods
Structural Attack

Adversarial Attack on Large Scale Graph

Authors: Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng | Published: 2020-09-08 | Updated: 2021-05-06
Graph Transformation
Adversarial Attack Methods
Structural Attack

One pixel attack for fooling deep neural networks

Authors: Jiawei Su, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2017-10-24 | Updated: 2019-10-17
Adversarial Example
Adversarial Example Detection
Structural Attack

Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries

Authors: Rui Zhang, Quanyan Zhu | Published: 2017-10-12
Convergence Property
Information Security
Structural Attack