Exploratory Attack

Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning

Authors: Francesco Diana, André Nusser, Chuan Xu, Giovanni Neglia | Published: 2025-05-15
Prompt leaking
Model Extraction Attack
Exploratory Attack

What Features in Prompts Jailbreak LLMs? Investigating the Mechanisms Behind Attacks

Authors: Nathalie Kirch, Constantin Weisser, Severin Field, Helen Yannakoudakis, Stephen Casper | Published: 2024-11-02 | Updated: 2025-05-14
Disabling Safety Mechanisms of LLM
Prompt Injection
Exploratory Attack

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24
Exploratory Attack
Adversarial Perturbation Techniques
Machine Learning Technology