Attack Method

Robustness bounds on the successful adversarial examples in probabilistic models: Implications from Gaussian processes

Authors: Hiroaki Maeshima, Akira Otsuka | Published: 2024-03-04 | Updated: 2025-03-19
Attack Method
Adversarial Example
Watermark Evaluation

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

Authors: Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li | Published: 2024-03-02
LLM Security
Prompt Injection
Attack Method

Attacking Delay-based PUFs with Minimal Adversary Model

Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar | Published: 2024-03-01
Evaluation Methods for PUF
Model Performance Evaluation
Attack Method

Coercing LLMs to do and reveal (almost) anything

Authors: Jonas Geiping, Alex Stein, Manli Shu, Khalid Saifullah, Yuxin Wen, Tom Goldstein | Published: 2024-02-21
LLM Security
Prompt Injection
Attack Method

The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative

Authors: Zhen Tan, Chengshuai Zhao, Raha Moraffah, Yifan Li, Yu Kong, Tianlong Chen, Huan Liu | Published: 2024-02-20 | Updated: 2024-06-03
LLM Security
Classification of Malicious Actors
Attack Method

IT Intrusion Detection Using Statistical Learning and Testbed Measurements

Authors: Xiaoxuan Wang, Rolf Stadler | Published: 2024-02-20
CVE Information Extraction
Intrusion Detection System
Attack Method

Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning

Authors: Shuai Zhao, Leilei Gan, Luu Anh Tuan, Jie Fu, Lingjuan Lyu, Meihuizi Jia, Jinming Wen | Published: 2024-02-19 | Updated: 2024-03-29
Backdoor Detection
Attack Method
Defense Method

Manipulating hidden-Markov-model inferences by corrupting batch data

Authors: William N. Caballero, Jose Manuel Camacho, Tahir Ekin, Roi Naveiro | Published: 2024-02-19
Quantification of Uncertainty
Attack Evaluation
Attack Method

FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning

Authors: Enrique Mármol Campos, Aurora González Vidal, José Luis Hernández Ramos, Antonio Skarmeta | Published: 2024-02-15
Poisoning
Attack Method
Federated Learning

PAL: Proxy-Guided Black-Box Attack on Large Language Models

Authors: Chawin Sitawarin, Norman Mu, David Wagner, Alexandre Araujo | Published: 2024-02-15
LLM Security
Prompt Injection
Attack Method