Input Reconstruction Attack against Vertical Federated Large Language Models Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24 Characteristics of VFLPrivacy ProtectionDefense Method 2023.11.07 2025.05.28 Literature Database
PubDef: Defending Against Transfer Attacks From Public Models Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17 Adversarial attackAdversarial TrainingDefense Method 2023.10.26 2025.05.28 Literature Database
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18 Privacy Protection MethodPrivacy TechniqueDefense Method 2023.10.18 2025.05.28 Literature Database
Assessing Robustness via Score-Based Adversarial Image Generation Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06 Data GenerationExperimental ValidationDefense Method 2023.10.06 2025.05.28 Literature Database
SmoothLLM: Defending Large Language Models Against Jailbreaking Attacks Authors: Alexander Robey, Eric Wong, Hamed Hassani, George J. Pappas | Published: 2023-10-05 | Updated: 2024-06-11 LLM Performance EvaluationPrompt InjectionDefense Method 2023.10.05 2025.05.28 Literature Database
Breaking On-Chip Communication Anonymity using Flow Correlation Attacks Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2025-05-06 Performance EvaluationTraffic Correlation AttackDefense Method 2023.09.27 2025.05.28 Literature Database
How Robust is Google’s Bard to Adversarial Image Attacks? Authors: Yinpeng Dong, Huanran Chen, Jiawei Chen, Zhengwei Fang, Xiao Yang, Yichi Zhang, Yu Tian, Hang Su, Jun Zhu | Published: 2023-09-21 | Updated: 2023-10-14 Adversarial TrainingDefense MethodFace Recognition 2023.09.21 2025.05.28 Literature Database
Defending Against Alignment-Breaking Attacks via Robustly Aligned LLM Authors: Bochuan Cao, Yuanpu Cao, Lu Lin, Jinghui Chen | Published: 2023-09-18 | Updated: 2024-06-12 Prompt InjectionSafety AlignmentDefense Method 2023.09.18 2025.05.28 Literature Database
DAD++: Improved Data-free Test Time Adversarial Defense Authors: Gaurav Kumar Nayak, Inder Khatri, Shubham Randive, Ruchit Rawal, Anirban Chakraborty | Published: 2023-09-10 Adversarial ExampleAdversarial attackDefense Method 2023.09.10 2025.05.28 Literature Database
Adversarially Robust Deep Learning with Optimal-Transport-Regularized Divergences Authors: Jeremiah Birrell, Mohammadreza Ebrahimi | Published: 2023-09-07 Malicious Demo ConstructionAdversarial attackDefense Method 2023.09.07 2025.05.28 Literature Database