AutoDFL: A Scalable and Automated Reputation-Aware Decentralized Federated Learning Authors: Meryem Malak Dif, Mouhamed Amine Bouchiha, Mourad Rabah, Yacine Ghamri-Doudane | Published: 2025-01-08 Privacy ProtectionFrameworkAttack Method 2025.01.08 2025.05.27 Literature Database
Auto-RT: Automatic Jailbreak Strategy Exploration for Red-Teaming Large Language Models Authors: Yanjiang Liu, Shuhen Zhou, Yaojie Lu, Huijia Zhu, Weiqiang Wang, Hongyu Lin, Ben He, Xianpei Han, Le Sun | Published: 2025-01-03 FrameworkPrompt InjectionAttack Method 2025.01.03 2025.05.27 Literature Database
Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs Authors: Linhao Huang, Xue Jiang, Zhiqiang Wang, Wentao Mo, Xi Xiao, Bo Han, Yongjie Yin, Feng Zheng | Published: 2025-01-02 | Updated: 2025-01-10 Attack EvaluationAttack MethodAdversarial Example 2025.01.02 2025.05.27 Literature Database
Heuristic-Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models Authors: Ma Teng, Jia Xiaojun, Duan Ranjie, Li Xinfeng, Huang Yihao, Chu Zhixuan, Liu Yang, Ren Wenqi | Published: 2024-12-08 | Updated: 2025-01-03 Content ModerationPrompt InjectionAttack Method 2024.12.08 2025.05.27 Literature Database
Indiscriminate Disruption of Conditional Inference on Multivariate Gaussians Authors: William N. Caballero, Matthew LaRosa, Alexander Fisher, Vahid Tarokh | Published: 2024-11-21 Attack MethodOptimization Problem 2024.11.21 2025.05.27 Literature Database
Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM Authors: Haizhou Wang, Nanqing Luo, Xusheng Li, Peng LIu | Published: 2024-11-08 | Updated: 2025-04-29 Malware EvolutionAttack MethodAnalysis of Detection Methods 2024.11.08 2025.05.27 Literature Database
Defense Against Prompt Injection Attack by Leveraging Attack Techniques Authors: Yulin Chen, Haoran Li, Zihao Zheng, Yangqiu Song, Dekai Wu, Bryan Hooi | Published: 2024-11-01 | Updated: 2025-07-22 Indirect Prompt InjectionPrompt InjectionAttack Method 2024.11.01 2025.07.24 Literature Database
Low-Rank Adversarial PGD Attack Authors: Dayana Savostianova, Emanuele Zangrando, Francesco Tudisco | Published: 2024-10-16 Attack Method 2024.10.16 2025.05.27 Literature Database
Unified Breakdown Analysis for Byzantine Robust Gossip Authors: Renaud Gaucher, Aymeric Dieuleveut, Hadrien Hendrikx | Published: 2024-10-14 | Updated: 2025-02-03 FrameworkAttack Method 2024.10.14 2025.05.27 Literature Database
Can a large language model be a gaslighter? Authors: Wei Li, Luyao Zhu, Yang Song, Ruixi Lin, Rui Mao, Yang You | Published: 2024-10-11 Prompt InjectionSafety AlignmentAttack Method 2024.10.11 2025.05.27 Literature Database