Study of Attacks on the HHL Quantum Algorithm Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10 CybersecurityAttack EvaluationAttack Method 2024.10.10 2025.05.27 Literature Database
Prompt Infection: LLM-to-LLM Prompt Injection within Multi-Agent Systems Authors: Donghyun Lee, Mo Tiwari | Published: 2024-10-09 Prompt InjectionAttack MethodDefense Method 2024.10.09 2025.05.27 Literature Database
Hallucinating AI Hijacking Attack: Large Language Models and Malicious Code Recommenders Authors: David Noever, Forrest McKee | Published: 2024-10-09 CybersecurityPrompt InjectionAttack Method 2024.10.09 2025.05.27 Literature Database
Harnessing Task Overload for Scalable Jailbreak Attacks on Large Language Models Authors: Yiting Dong, Guobin Shen, Dongcheng Zhao, Xiang He, Yi Zeng | Published: 2024-10-05 LLM SecurityPrompt InjectionAttack Method 2024.10.05 2025.05.27 Literature Database
Impact of White-Box Adversarial Attacks on Convolutional Neural Networks Authors: Rakesh Podder, Sudipto Ghosh | Published: 2024-10-02 Model Performance EvaluationAttack MethodAdversarial Example 2024.10.02 2025.05.27 Literature Database
Hard-Label Cryptanalytic Extraction of Neural Network Models Authors: Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang | Published: 2024-09-18 Model Extraction AttackAttack MethodComputational Complexity 2024.09.18 2025.05.27 Literature Database
Context-Aware Membership Inference Attacks against Pre-trained Large Language Models Authors: Hongyan Chang, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Reza Shokri | Published: 2024-09-11 LLM SecurityMembership InferenceAttack Method 2024.09.11 2025.05.27 Literature Database
AdaPPA: Adaptive Position Pre-Fill Jailbreak Attack Approach Targeting LLMs Authors: Lijia Lv, Weigang Zhang, Xuehai Tang, Jie Wen, Feng Liu, Jizhong Han, Songlin Hu | Published: 2024-09-11 LLM SecurityPrompt InjectionAttack Method 2024.09.11 2025.05.27 Literature Database
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective Authors: Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller | Published: 2024-09-10 WatermarkingAttack MethodWatermark Robustness 2024.09.10 2025.05.27 Literature Database
Well, that escalated quickly: The Single-Turn Crescendo Attack (STCA) Authors: Alan Aqrawi, Arian Abbasi | Published: 2024-09-04 | Updated: 2024-09-10 LLM SecurityContent ModerationAttack Method 2024.09.04 2025.05.27 Literature Database