Membership Inference Attacks Against In-Context Learning Authors: Rui Wen, Zheng Li, Michael Backes, Yang Zhang | Published: 2024-09-02 Prompt InjectionMembership InferenceAttack Method 2024.09.02 2025.05.27 Literature Database
Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack Authors: Guanzhong Chen, Zhenghan Qin, Mingxin Yang, Yajie Zhou, Tao Fan, Tianyu Du, Zenglin Xu | Published: 2024-09-02 | Updated: 2024-09-04 LLM SecurityPrompt InjectionAttack Method 2024.09.02 2025.05.27 Literature Database
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks Authors: Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao | Published: 2024-08-31 | Updated: 2024-09-04 Membership InferenceAttack MethodDifficulty Calibration 2024.08.31 2025.05.27 Literature Database
AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN) Authors: Lorenzo Guerra, Linhan Xu, Paolo Bellavista, Thomas Chapuis, Guillaume Duc, Pavlo Mozharovskyi, Van-Tam Nguyen | Published: 2024-08-30 | Updated: 2024-09-05 Attack MethodAutomated Intrusion Detection SystemVehicle Network Security 2024.08.30 2025.05.27 Literature Database
LLM Defenses Are Not Robust to Multi-Turn Human Jailbreaks Yet Authors: Nathaniel Li, Ziwen Han, Ian Steneker, Willow Primack, Riley Goodside, Hugh Zhang, Zifan Wang, Cristina Menghini, Summer Yue | Published: 2024-08-27 | Updated: 2024-09-04 Prompt InjectionUser EducationAttack Method 2024.08.27 2025.05.27 Literature Database
Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks Authors: Yusuf Usman, Aadesh Upadhyay, Prashnna Gyawali, Robin Chataut | Published: 2024-08-23 CybersecurityPrompt InjectionAttack Method 2024.08.23 2025.05.27 Literature Database
Security Attacks on LLM-based Code Completion Tools Authors: Wen Cheng, Ke Sun, Xinyu Zhang, Wei Wang | Published: 2024-08-20 | Updated: 2025-01-02 LLM SecurityPrompt InjectionAttack Method 2024.08.20 2025.05.27 Literature Database
Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning Authors: William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore | Published: 2024-08-10 Attack MethodTime Window AnalysisVehicle Network Security 2024.08.10 2025.05.27 Literature Database
LaFA: Latent Feature Attacks on Non-negative Matrix Factorization Authors: Minh Vu, Ben Nebgen, Erik Skau, Geigh Zollicoffer, Juan Castorena, Kim Rasmussen, Boian Alexandrov, Manish Bhattarai | Published: 2024-08-07 WatermarkingAttack MethodAdversarial Example 2024.08.07 2025.05.27 Literature Database
EnJa: Ensemble Jailbreak on Large Language Models Authors: Jiahao Zhang, Zilong Wang, Ruofan Wang, Xingjun Ma, Yu-Gang Jiang | Published: 2024-08-07 Prompt InjectionAttack MethodEvaluation Method 2024.08.07 2025.05.27 Literature Database