バックドア攻撃

Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models

Authors: Jiaming He, Wenbo Jiang, Guanyu Hou, Wenshu Fan, Rui Zhang, Hongwei Li | Published: 2024-04-23 | Updated: 2025-01-08
LLMセキュリティ
バックドア攻撃
ポイズニング

Competition Report: Finding Universal Jailbreak Backdoors in Aligned LLMs

Authors: Javier Rando, Francesco Croce, Kryštof Mitka, Stepan Shabalin, Maksym Andriushchenko, Nicolas Flammarion, Florian Tramèr | Published: 2024-04-22 | Updated: 2024-06-06
LLMセキュリティ
バックドア攻撃
プロンプトインジェクション

Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models

Authors: Zhenyang Ni, Rui Ye, Yuxi Wei, Zhen Xiang, Yanfeng Wang, Siheng Chen | Published: 2024-04-19 | Updated: 2024-04-22
バックドア攻撃
自動運転技術の脆弱性

Exploring Backdoor Vulnerabilities of Chat Models

Authors: Yunzhuo Hao, Wenkai Yang, Yankai Lin | Published: 2024-04-03
バックドア攻撃
プロンプトインジェクション

Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models

Authors: Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Geiping, Tom Goldstein, Nicholas Carlini | Published: 2024-04-01
バックドア攻撃
ポイズニング
メンバーシップ推論

A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks

Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07
データセット生成
バックドア攻撃
ポイズニング

Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency

Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15
ウォーターマーキング
バックドア攻撃
ポイズニング

Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach

Authors: Yue Fu, Qingqing Ye, Rong Du, Haibo Hu | Published: 2024-03-15
バックドア攻撃
プライバシー保護手法
戦略的ゲーム

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects

Authors: Na Li, Chunyi Zhou, Yansong Gao, Hui Chen, Anmin Fu, Zhi Zhang, Yu Shui | Published: 2024-03-13
バックドア攻撃
メンバーシップ推論
機械学習の忘却

Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code

Authors: Cristina Improta | Published: 2024-03-11
セキュリティ分析
バックドア攻撃
ポイズニング