Poisoning

Attack Tree Analysis for Adversarial Evasion Attacks

Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28
Poisoning
Adversarial attack
Watermark Evaluation

Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation

Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo | Published: 2023-12-28
Poisoning
Machine Unlearning
Watermark Evaluation

Defenses in Adversarial Machine Learning: A Survey

Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13
Poisoning
Adversarial Example
Defense Method

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks

Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11
Poisoning
Robustness Evaluation
Adversarial attack

Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

Authors: Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek | Published: 2023-12-06 | Updated: 2024-10-07
Character Role Acting
Prompt Injection
Poisoning

Rethinking PGD Attack: Is Sign Function Necessary?

Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21
Poisoning
Robustness Evaluation
Adversarial attack

The Philosopher’s Stone: Trojaning Plugins of Large Language Models

Authors: Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu | Published: 2023-12-01 | Updated: 2024-09-11
Prompt Injection
Poisoning
Poisoning Attack

Exploring the Robustness of Decentralized Training for Large Language Models

Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01
Privacy Protection Method
Poisoning
Poisoning Attack

Using Decentralized Aggregation for Federated Learning with Differential Privacy

Authors: Hadeel Abd El-Kareem, Abd El-Moaty Saleh, Ana Fernández-Vilas, Manuel Fernández-Veiga, asser El-Sonbaty | Published: 2023-11-27
Privacy Protection
Poisoning
Experimental Validation

Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems

Authors: Guangjing Wang, Ce Zhou, Yuanda Wang, Bocheng Chen, Hanqing Guo, Qiben Yan | Published: 2023-11-20
Prompt Injection
Poisoning
Transfer Learning