ToxicSQL: Migrating SQL Injection Threats into Text-to-SQL Models via Backdoor Attack
Authors: Meiyu Lin, Haichuan Zhang, Jiale Lao, Renyuan Li, Yuanchun Zhou, Carl Yang, Yang Cao, Mingjie Tang | Published: 2025-03-07 | Updated: 2025-04-03
Backdoor Detection
Backdoor Attack
Model Performance Evaluation