Transfer Attacks and Defenses for Large Language Models on Coding Tasks Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu | Published: 2023-11-22 Prompt InjectionAdversarial attackDefense Method 2023.11.22 2025.05.28 Literature Database
Adversarial Purification for Data-Driven Power System Event Classifiers with Diffusion Models Authors: Yuanbin Cheng, Koji Yamashita, Jim Follum, Nanpeng Yu | Published: 2023-11-13 Adversarial Text PurificationOptimization ProblemDefense Method 2023.11.13 2025.05.28 Literature Database
Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11 Improvement of LearningDeep Learning MethodDefense Method 2023.11.11 2025.05.28 Literature Database
Does Differential Privacy Prevent Backdoor Attacks in Practice? Authors: Fereshteh Razmi, Jian Lou, Li Xiong | Published: 2023-11-10 Data Privacy AssessmentTrade-off AnalysisDefense Method 2023.11.10 2025.05.28 Literature Database
Input Reconstruction Attack against Vertical Federated Large Language Models Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24 Characteristics of VFLPrivacy ProtectionDefense Method 2023.11.07 2025.05.28 Literature Database
PubDef: Defending Against Transfer Attacks From Public Models Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17 Adversarial attackAdversarial TrainingDefense Method 2023.10.26 2025.05.28 Literature Database
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18 Privacy Protection MethodPrivacy TechniqueDefense Method 2023.10.18 2025.05.28 Literature Database
Assessing Robustness via Score-Based Adversarial Image Generation Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06 Data GenerationExperimental ValidationDefense Method 2023.10.06 2025.05.28 Literature Database
SmoothLLM: Defending Large Language Models Against Jailbreaking Attacks Authors: Alexander Robey, Eric Wong, Hamed Hassani, George J. Pappas | Published: 2023-10-05 | Updated: 2024-06-11 LLM Performance EvaluationPrompt InjectionDefense Method 2023.10.05 2025.05.28 Literature Database
Breaking On-Chip Communication Anonymity using Flow Correlation Attacks Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2025-05-06 Performance EvaluationTraffic Correlation AttackDefense Method 2023.09.27 2025.05.28 Literature Database