Attack Method

Test-Time Backdoor Attacks on Multimodal Large Language Models

Authors: Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin | Published: 2024-02-13
Backdoor Attack
Model Performance Evaluation
Attack Method

Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams | Published: 2024-01-03
Cybersecurity
Attack Method
Time-Related Features

Can you See me? On the Visibility of NOPs against Android Malware Detectors

Authors: Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger | Published: 2023-12-28
Code Change Analysis
Attack Method
Watermark Evaluation

A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models

Authors: Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan | Published: 2023-12-18
Cyber Attack
Prompt Injection
Attack Method

JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

Authors: Xiaoyu Zhang, Cen Zhang, Tianlin Li, Yihao Huang, Xiaojun Jia, Ming Hu, Jie Zhang, Yang Liu, Shiqing Ma, Chao Shen | Published: 2023-12-17 | Updated: 2025-03-15
Text Perturbation Method
Prompt Injection
Attack Method

Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data

Authors: Youssra Cheriguene, Wael Jaafar, Halim Yanikomeroglu, Chaker Abdelaziz Kerrache | Published: 2023-12-16
Participant Selection Method
Attack Method
Federated Learning

Low-Cost High-Power Membership Inference Attacks

Authors: Sajjad Zarifzadeh, Philippe Liu, Reza Shokri | Published: 2023-12-06 | Updated: 2024-06-12
Membership Inference
Low-Cost Membership Inference Method
Attack Method

Breaking XOR Arbiter PUFs without Reliability Information

Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03
Evaluation Methods for PUF
Watermarking
Attack Method

FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework

Authors: Sheldon C. Ebron Jr., Kan Yang | Published: 2023-11-17
Model Architecture
Attack Method
Evaluation Method

You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks

Authors: Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze | Published: 2023-11-16 | Updated: 2023-12-19
Rule Attribution
Attack Method
Adaptive Misuse Detection