Defense Method

Input Reconstruction Attack against Vertical Federated Large Language Models

Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24
Characteristics of VFL
Privacy Protection
Defense Method

PubDef: Defending Against Transfer Attacks From Public Models

Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17
Adversarial attack
Adversarial Training
Defense Method

A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses

Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18
Privacy Protection Method
Privacy Technique
Defense Method

Assessing Robustness via Score-Based Adversarial Image Generation

Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06
Data Generation
Experimental Validation
Defense Method

SmoothLLM: Defending Large Language Models Against Jailbreaking Attacks

Authors: Alexander Robey, Eric Wong, Hamed Hassani, George J. Pappas | Published: 2023-10-05 | Updated: 2024-06-11
LLM Performance Evaluation
Prompt Injection
Defense Method

Breaking On-Chip Communication Anonymity using Flow Correlation Attacks

Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2025-05-06
Performance Evaluation
Traffic Correlation Attack
Defense Method

How Robust is Google’s Bard to Adversarial Image Attacks?

Authors: Yinpeng Dong, Huanran Chen, Jiawei Chen, Zhengwei Fang, Xiao Yang, Yichi Zhang, Yu Tian, Hang Su, Jun Zhu | Published: 2023-09-21 | Updated: 2023-10-14
Adversarial Training
Defense Method
Face Recognition

Defending Against Alignment-Breaking Attacks via Robustly Aligned LLM

Authors: Bochuan Cao, Yuanpu Cao, Lu Lin, Jinghui Chen | Published: 2023-09-18 | Updated: 2024-06-12
Prompt Injection
Safety Alignment
Defense Method

DAD++: Improved Data-free Test Time Adversarial Defense

Authors: Gaurav Kumar Nayak, Inder Khatri, Shubham Randive, Ruchit Rawal, Anirban Chakraborty | Published: 2023-09-10
Adversarial Example
Adversarial attack
Defense Method

Adversarially Robust Deep Learning with Optimal-Transport-Regularized Divergences

Authors: Jeremiah Birrell, Mohammadreza Ebrahimi | Published: 2023-09-07
Malicious Demo Construction
Adversarial attack
Defense Method