Model Extraction Attack

Silent Guardians: Independent and Secure Decision Tree Evaluation Without Chatter

Authors: Jinyuan Li, Liang Feng Zhang | Published: 2026-03-30
Privacy Technique
Model Extraction Attack
Computational Efficiency

Adversarial Attacks on Multimodal Large Language Models: A Comprehensive Survey

Authors: Bhavuk Jain, Sercan Ö. Arık, Hardeo K. Thakur | Published: 2026-03-30
Model Extraction Attack
Large Language Model
安全性に関連するマルチモーダルなアプローチ

Unveiling the Resilience of LLM-Enhanced Search Engines against Black-Hat SEO Manipulation

Authors: Pei Chen, Geng Hong, Xinyi Wu, Mengying Wu, Zixuan Zhu, Mingxuan Liu, Baojun Liu, Mi Zhang, Min Yang | Published: 2026-03-26
Prompt leaking
Model Extraction Attack
Large Language Model

Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems

Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12
Prompt Injection
Model Extraction Attack
Vulnerability Management

Kraken: Higher-order EM Side-Channel Attacks on DNNs in Near and Far Field

Authors: Peter Horvath, Ilia Shumailov, Lukasz Chmielewski, Lejla Batina, Yuval Yarom | Published: 2026-03-03
LLM Performance Evaluation
Model Extraction Attack

RobPI: Robust Private Inference against Malicious Client

Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23
Model Extraction Attack
Adversarial Learning
Defense Mechanism

LLM-enabled Applications Require System-Level Threat Monitoring

Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23
Poisoning attack on RAG
Model Extraction Attack
監視手法

SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models

Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23
Malware Detection
Malware Detection Method
Model Extraction Attack

Comparative Insights on Adversarial Machine Learning from Industry and Academia: A User-Study Approach

Authors: Vishruti Kakkad, Paul Chung, Hanan Hibshi, Maverick Woo | Published: 2026-02-04
Poisoning
Model Extraction Attack
教育手法

Semantic Consensus Decoding: Backdoor Defense for Verilog Code Generation

Authors: Guang Yang, Xing Hu, Xiang Chen, Xin Xia | Published: 2026-02-04
Security of Code Generation
Backdoor Detection
Model Extraction Attack