Defense Method

Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning

Authors: Joon Kim, Sejin Park | Published: 2024-08-15
Watermarking
Poisoning
Defense Method

Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks

Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Weiming Zhang | Published: 2024-08-15 | Updated: 2024-08-22
LLM Security
Prompt Injection
Defense Method

Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era

Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08
DoS Mitigation
Privacy Protection Method
Defense Method

Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis

Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06
Phishing Detection
Model Performance Evaluation
Defense Method

Mitigating Malicious Attacks in Federated Learning via Confidence-aware Defense

Authors: Qilei Li, Ahmed M. Abdelmoniem | Published: 2024-08-05 | Updated: 2024-08-16
DoS Mitigation
Poisoning
Defense Method

OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack

Authors: Kuo Gai, Sicong Wang, Shihua Zhang | Published: 2024-08-01
Adversarial Training
Optimization Problem
Defense Method

Variational Randomized Smoothing for Sample-Wise Adversarial Robustness

Authors: Ryo Hase, Ye Wang, Toshiaki Koike-Akino, Jing Liu, Kieran Parsons | Published: 2024-07-16
Regularization
Watermark Robustness
Defense Method

Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition

Authors: Edoardo Debenedetti, Javier Rando, Daniel Paleka, Silaghi Fineas Florin, Dragos Albastroiu, Niv Cohen, Yuval Lemberg, Reshmi Ghosh, Rui Wen, Ahmed Salem, Giovanni Cherubin, Santiago Zanella-Beguelin, Robin Schmid, Victor Klemm, Takahiro Miki, Chenhao Li, Stefan Kraft, Mario Fritz, Florian Tramèr, Sahar Abdelnabi, Lea Schönherr | Published: 2024-06-12
LLM Security
Prompt Injection
Defense Method

A Study of Backdoors in Instruction Fine-tuned Language Models

Authors: Jayaram Raghuram, George Kesidis, David J. Miller | Published: 2024-06-12 | Updated: 2024-08-21
LLM Security
Backdoor Attack
Defense Method

AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens

Authors: Lin Lu, Hai Yan, Zenghui Yuan, Jiawen Shi, Wenqi Wei, Pin-Yu Chen, Pan Zhou | Published: 2024-06-06
LLM Performance Evaluation
Prompt Injection
Defense Method