Computing Optimization-Based Prompt Injections Against Closed-Weights Models By Misusing a Fine-Tuning API Authors: Andrey Labunets, Nishit V. Pandya, Ashish Hooda, Xiaohan Fu, Earlence Fernandes | Published: 2025-01-16 プロンプトインジェクション攻撃の評価最適化問題 2025.01.16 2025.04.03 文献データベース
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks Authors: Yixiao Xu, Binxing Fang, Rui Wang, Yinghai Zhou, Shouling Ji, Yuan Liu, Mohan Li, Zhihong Tian | Published: 2025-01-16 | Updated: 2025-01-17 ウォーターマーキングモデル抽出攻撃攻撃の評価 2025.01.16 2025.04.03 文献データベース
Exploring and Mitigating Adversarial Manipulation of Voting-Based Leaderboards Authors: Yangsibo Huang, Milad Nasr, Anastasios Angelopoulos, Nicholas Carlini, Wei-Lin Chiang, Christopher A. Choquette-Choo, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Ken Ziyu Liu, Ion Stoica, Florian Tramer, Chiyuan Zhang | Published: 2025-01-13 サイバーセキュリティ大規模言語モデル攻撃の評価 2025.01.13 2025.04.03 文献データベース
Learning-based Detection of GPS Spoofing Attack for Quadrotors Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10 サイバーセキュリティ実験的検証攻撃の評価 2025.01.10 2025.04.03 文献データベース
Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs Authors: Linhao Huang, Xue Jiang, Zhiqiang Wang, Wentao Mo, Xi Xiao, Bo Han, Yongjie Yin, Feng Zheng | Published: 2025-01-02 | Updated: 2025-01-10 攻撃の評価攻撃手法敵対的サンプル 2025.01.02 2025.04.03 文献データベース
FEDLAD: Federated Evaluation of Deep Leakage Attacks and Defenses Authors: Isaac Baglin, Xiatian Zhu, Simon Hadfield | Published: 2024-11-05 | Updated: 2025-01-05 ポイズニング攻撃の評価評価手法 2024.11.05 2025.04.03 文献データベース
F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14 プロンプトインジェクション攻撃の評価攻撃手法 2024.10.11 2025.04.03 文献データベース
Study of Attacks on the HHL Quantum Algorithm Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10 サイバーセキュリティ攻撃の評価攻撃手法 2024.10.10 2025.04.03 文献データベース
Robustness Reprogramming for Representation Learning Authors: Zhichao Hou, MohamadAli Torkamani, Hamid Krim, Xiaorui Liu | Published: 2024-10-06 攻撃の評価防御手法 2024.10.06 2025.04.03 文献データベース
TA3: Testing Against Adversarial Attacks on Machine Learning Models Authors: Yuanzhe Jin, Min Chen | Published: 2024-10-06 攻撃の評価 2024.10.06 2025.04.03 文献データベース