Pre-trained Encoder Inference: Revealing Upstream Encoders In Downstream Machine Learning Services Authors: Shaopeng Fu, Xuexue Sun, Ke Qing, Tianhang Zheng, Di Wang | Published: 2024-08-05 Privacy Protection MethodMembership InferenceAttack Method 2024.08.05 2025.05.27 Literature Database
Practical Attacks against Black-box Code Completion Engines Authors: Slobodan Jenko, Jingxuan He, Niels Mündler, Mark Vero, Martin Vechev | Published: 2024-08-05 Attack MethodVulnerability ManagementEvaluation Method 2024.08.05 2025.05.27 Literature Database
Systematic Categorization, Construction and Evaluation of New Attacks against Multi-modal Mobile GUI Agents Authors: Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang | Published: 2024-07-12 | Updated: 2025-03-16 Indirect Prompt InjectionAttack MethodVulnerability Attack Method 2024.07.12 2025.05.27 Literature Database
TPIA: Towards Target-specific Prompt Injection Attack against Code-oriented Large Language Models Authors: Yuchen Yang, Hongwei Yao, Bingrun Yang, Yiling He, Yiming Li, Tianwei Zhang, Zhan Qin, Kui Ren, Chun Chen | Published: 2024-07-12 | Updated: 2025-01-16 LLM SecurityPrompt InjectionAttack Method 2024.07.12 2025.05.27 Literature Database
MALT Powers Up Adversarial Attacks Authors: Odelia Melamed, Gilad Yehudai, Adi Shamir | Published: 2024-07-02 Mesoscopic LinearityAttack MethodEvaluation Method 2024.07.02 2025.05.27 Literature Database
Can Go AIs be adversarially robust? Authors: Tom Tseng, Euan McLean, Kellin Pelrine, Tony T. Wang, Adam Gleave | Published: 2024-06-18 | Updated: 2025-01-14 Model Performance EvaluationAttack MethodWatermark Evaluation 2024.06.18 2025.05.27 Literature Database
UIFV: Data Reconstruction Attack in Vertical Federated Learning Authors: Jirui Yang, Peng Chen, Zhihui Lu, Qiang Duan, Yubing Bao | Published: 2024-06-18 | Updated: 2025-01-14 Data Privacy AssessmentFrameworkAttack Method 2024.06.18 2025.05.27 Literature Database
Knowledge Return Oriented Prompting (KROP) Authors: Jason Martin, Kenneth Yeung | Published: 2024-06-11 LLM SecurityPrompt InjectionAttack Method 2024.06.11 2025.05.27 Literature Database
Model for Peanuts: Hijacking ML Models without Training Access is Possible Authors: Mahmoud Ghorbel, Halima Bouzidi, Ioan Marius Bilasco, Ihsen Alouani | Published: 2024-06-03 Membership InferenceAttack MethodFace Recognition System 2024.06.03 2025.05.27 Literature Database
Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data Authors: Thibault Simonetto, Salah Ghamizi, Maxime Cordy | Published: 2024-06-02 CAPGD AlgorithmAttack MethodAdversarial Training 2024.06.02 2025.05.27 Literature Database