Test-Time Backdoor Attacks on Multimodal Large Language Models Authors: Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin | Published: 2024-02-13 Backdoor AttackModel Performance EvaluationAttack Method 2024.02.13 2025.05.27 Literature Database
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams | Published: 2024-01-03 CybersecurityAttack MethodTime-Related Features 2024.01.03 2025.05.27 Literature Database
Can you See me? On the Visibility of NOPs against Android Malware Detectors Authors: Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger | Published: 2023-12-28 Code Change AnalysisAttack MethodWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models Authors: Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan | Published: 2023-12-18 Cyber AttackPrompt InjectionAttack Method 2023.12.18 2025.05.27 Literature Database
JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks Authors: Xiaoyu Zhang, Cen Zhang, Tianlin Li, Yihao Huang, Xiaojun Jia, Ming Hu, Jie Zhang, Yang Liu, Shiqing Ma, Chao Shen | Published: 2023-12-17 | Updated: 2025-03-15 Text Perturbation MethodPrompt InjectionAttack Method 2023.12.17 2025.05.27 Literature Database
Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data Authors: Youssra Cheriguene, Wael Jaafar, Halim Yanikomeroglu, Chaker Abdelaziz Kerrache | Published: 2023-12-16 Participant Selection MethodAttack MethodFederated Learning 2023.12.16 2025.05.27 Literature Database
Low-Cost High-Power Membership Inference Attacks Authors: Sajjad Zarifzadeh, Philippe Liu, Reza Shokri | Published: 2023-12-06 | Updated: 2024-06-12 Membership InferenceLow-Cost Membership Inference MethodAttack Method 2023.12.06 2025.05.28 Literature Database
Breaking XOR Arbiter PUFs without Reliability Information Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03 Evaluation Methods for PUFWatermarkingAttack Method 2023.12.03 2025.05.28 Literature Database
FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework Authors: Sheldon C. Ebron Jr., Kan Yang | Published: 2023-11-17 Model ArchitectureAttack MethodEvaluation Method 2023.11.17 2025.05.28 Literature Database
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks Authors: Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze | Published: 2023-11-16 | Updated: 2023-12-19 Rule AttributionAttack MethodAdaptive Misuse Detection 2023.11.16 2025.05.28 Literature Database