攻撃の分類

InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents

Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang | Published: 2024-03-05 | Updated: 2024-08-04
インダイレクトプロンプトインジェクション
攻撃の分類
脆弱性分析

Watermark Stealing in Large Language Models

Authors: Nikola Jovanović, Robin Staab, Martin Vechev | Published: 2024-02-29 | Updated: 2024-06-24
モデル抽出攻撃
大規模言語モデル
攻撃の分類

How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications

Authors: Jiong Zhu, Junchen Jin, Donald Loveland, Michael T. Schaub, Danai Koutra | Published: 2021-06-14 | Updated: 2022-07-23
データセット評価
モデルの設計や精度
攻撃の分類

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
データセット評価
侵入検知システム
攻撃の分類

Exacerbating Algorithmic Bias through Fairness Attacks

Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16
攻撃の分類
敵対的攻撃手法
機械学習の役割

GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10
データセット評価
攻撃の分類
機械学習の役割

Composite Adversarial Attacks

Authors: Xiaofeng Mao, Yuefeng Chen, Shuhui Wang, Hang Su, Yuan He, Hui Xue | Published: 2020-12-10
攻撃の分類
敵対的攻撃手法
防御メカニズム

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization

Authors: Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan | Published: 2020-10-24 | Updated: 2021-11-30
攻撃の分類
攻撃手法
知識グラフ

A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid

Authors: Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch | Published: 2019-12-31
モデル選択手法
攻撃の分類
自動化された侵入検知システム

A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms

Authors: Suchet Sapre, Pouyan Ahmadi, Khondkar Islam | Published: 2019-12-31
モデル選択手法
攻撃の分類
自動化された侵入検知システム