Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning Authors: Francesco Diana, André Nusser, Chuan Xu, Giovanni Neglia | Published: 2025-05-15 Prompt leakingModel Extraction AttackExploratory Attack 2025.05.15 2025.05.28 Literature Database
What Features in Prompts Jailbreak LLMs? Investigating the Mechanisms Behind Attacks Authors: Nathalie Kirch, Constantin Weisser, Severin Field, Helen Yannakoudakis, Stephen Casper | Published: 2024-11-02 | Updated: 2025-05-14 Disabling Safety Mechanisms of LLMPrompt InjectionExploratory Attack 2024.11.02 2025.05.28 Literature Database
Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24 Exploratory AttackAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.24 2025.05.28 Literature Database