F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14 Prompt InjectionAttack EvaluationAttack Method 2024.10.11 2025.05.27 Literature Database
Time Traveling to Defend Against Adversarial Example Attacks in Image Classification Authors: Anthony Etim, Jakub Szefer | Published: 2024-10-10 Attack MethodAdversarial ExampleDefense Method 2024.10.10 2025.05.27 Literature Database
Study of Attacks on the HHL Quantum Algorithm Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10 CybersecurityAttack EvaluationAttack Method 2024.10.10 2025.05.27 Literature Database
Prompt Infection: LLM-to-LLM Prompt Injection within Multi-Agent Systems Authors: Donghyun Lee, Mo Tiwari | Published: 2024-10-09 Prompt InjectionAttack MethodDefense Method 2024.10.09 2025.05.27 Literature Database
Hallucinating AI Hijacking Attack: Large Language Models and Malicious Code Recommenders Authors: David Noever, Forrest McKee | Published: 2024-10-09 CybersecurityPrompt InjectionAttack Method 2024.10.09 2025.05.27 Literature Database
Harnessing Task Overload for Scalable Jailbreak Attacks on Large Language Models Authors: Yiting Dong, Guobin Shen, Dongcheng Zhao, Xiang He, Yi Zeng | Published: 2024-10-05 LLM SecurityPrompt InjectionAttack Method 2024.10.05 2025.05.27 Literature Database
Impact of White-Box Adversarial Attacks on Convolutional Neural Networks Authors: Rakesh Podder, Sudipto Ghosh | Published: 2024-10-02 Model Performance EvaluationAttack MethodAdversarial Example 2024.10.02 2025.05.27 Literature Database
Hard-Label Cryptanalytic Extraction of Neural Network Models Authors: Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang | Published: 2024-09-18 Model Extraction AttackAttack MethodComputational Complexity 2024.09.18 2025.05.27 Literature Database
Context-Aware Membership Inference Attacks against Pre-trained Large Language Models Authors: Hongyan Chang, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Reza Shokri | Published: 2024-09-11 LLM SecurityMembership InferenceAttack Method 2024.09.11 2025.05.27 Literature Database
AdaPPA: Adaptive Position Pre-Fill Jailbreak Attack Approach Targeting LLMs Authors: Lijia Lv, Weigang Zhang, Xuehai Tang, Jie Wen, Feng Liu, Jizhong Han, Songlin Hu | Published: 2024-09-11 LLM SecurityPrompt InjectionAttack Method 2024.09.11 2025.05.27 Literature Database