ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis Authors: Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu | Published: 2025-06-18 | Updated: 2025-07-08 Event IdentificationInformation SecurityVulnerability Attack Method 2025.06.18 2025.07.10 Literature Database
Systematic Categorization, Construction and Evaluation of New Attacks against Multi-modal Mobile GUI Agents Authors: Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang | Published: 2024-07-12 | Updated: 2025-03-16 Indirect Prompt InjectionAttack MethodVulnerability Attack Method 2024.07.12 2025.05.27 Literature Database
Talking Trojan: Analyzing an Industry-Wide Disclosure Authors: Nicholas Boucher, Ross Anderson | Published: 2022-09-22 Open Source DisclosureSecurity labelVulnerability Attack Method 2022.09.22 2025.05.28 Literature Database
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16 Dataset evaluationVulnerability Attack MethodEvaluation Method 2022.03.16 2025.05.28 Literature Database
RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14 PoisoningVulnerability Attack MethodDefense Method 2022.03.14 2025.05.28 Literature Database
Pixle: a fast and effective black-box attack based on rearranging pixels Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04 Adversarial Attack DetectionVulnerability Attack MethodDefense Method 2022.02.04 2025.05.28 Literature Database
Simple Transparent Adversarial Examples Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20 WatermarkingAdversarial attackVulnerability Attack Method 2021.05.20 2025.05.28 Literature Database
A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13 PoisoningAdversarial Attack MethodsVulnerability Attack Method 2020.03.26 2025.05.28 Literature Database
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26 Training MethodState Transition ModelVulnerability Attack Method 2020.03.17 2025.05.28 Literature Database
Diversity can be Transferred: Output Diversification for White- and Black-box Attacks Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30 PoisoningAdversarial Attack MethodsVulnerability Attack Method 2020.03.15 2025.05.28 Literature Database