PhishClone: Measuring the Efficacy of Cloning Evasion Attacks Authors: Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere | Published: 2022-09-04 Website Cloning TechnologyDetection Rate of Phishing AttacksPrompt Injection 2022.09.04 2025.05.28 Literature Database
Generative Adversarial Networks and Image-Based Malware Classification Authors: Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp | Published: 2022-06-08 Prompt InjectionMalware Propagation MeansImage Forensics 2022.06.08 2025.05.28 Literature Database
DNS based In-Browser Cryptojacking Detection Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2022-05-10 Performance EvaluationPrompt InjectionAttack Detection 2022.05.10 2025.05.28 Literature Database
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24 Prompt InjectionModel Selection MethodDefense Method 2022.02.15 2025.05.28 Literature Database
Examining Zero-Shot Vulnerability Repair with Large Language Models Authors: Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt | Published: 2021-12-03 | Updated: 2022-08-15 Program Interpretation GraphPrompt InjectionAutomated Vulnerability Remediation 2021.12.03 2025.05.28 Literature Database
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03 Prompt InjectionMalware Detection MethodAdversarial Attack Methods 2021.12.03 2025.05.28 Literature Database
Teacher Model Fingerprinting Attacks Against Transfer Learning Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23 WatermarkingData CollectionPrompt Injection 2021.06.23 2025.05.28 Literature Database
Bad Characters: Imperceptible NLP Attacks Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2021-06-18 | Updated: 2021-12-11 Cyber AttackPrompt InjectionMachine Learning Application 2021.06.18 2025.05.28 Literature Database
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15 Prompt InjectionAttack TypeDefense Method 2020.04.15 2025.05.28 Literature Database
To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08 Prompt InjectionMembership InferenceAdversarial Learning 2020.01.08 2025.05.28 Literature Database