Boosting Jailbreak Attack with Momentum Authors: Yihao Zhang, Zeming Wei | Published: 2024-05-02 WatermarkingPrompt InjectionAttack Method 2024.05.02 2025.05.27 Literature Database
Attacks on Third-Party APIs of Large Language Models Authors: Wanru Zhao, Vidit Khazanchi, Haodi Xing, Xuanli He, Qiongkai Xu, Nicholas Donald Lane | Published: 2024-04-24 LLM SecurityPrompt InjectionAttack Method 2024.04.24 2025.05.27 Literature Database
MISLEAD: Manipulating Importance of Selected features for Learning Epsilon in Evasion Attack Deception Authors: Vidit Khazanchi, Pavan Kulkarni, Yuvaraj Govindarajulu, Manojkumar Parmar | Published: 2024-04-24 | Updated: 2024-05-02 Model InterpretabilityAttack MethodAdversarial Training 2024.04.24 2025.05.27 Literature Database
Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15 DDoS Attack DetectionAttack MethodAdversarial Example 2024.04.15 2025.05.27 Literature Database
Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs Authors: Bibek Upadhayay, Vahid Behzadan | Published: 2024-04-09 LLM SecurityPrompt InjectionAttack Method 2024.04.09 2025.05.27 Literature Database
Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2024-04-09 PoisoningAttack MethodDefense Method 2024.04.09 2025.05.27 Literature Database
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01 WatermarkingAttack MethodAdversarial Example 2024.04.08 2025.05.27 Literature Database
Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion | Published: 2024-04-02 | Updated: 2024-10-07 LLM SecurityPrompt InjectionAttack Method 2024.04.02 2025.05.27 Literature Database
Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial Attack Authors: Ying Zhou, Ben He, Le Sun | Published: 2024-04-02 LLM SecurityWatermarkingAttack Method 2024.04.02 2025.05.27 Literature Database
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov | Published: 2024-03-20 | Updated: 2024-06-07 Attack MethodAdversarial ExampleDefense Method 2024.03.20 2025.05.27 Literature Database