攻撃の評価

Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis

Authors: Zhipeng He, Chun Ouyang, Laith Alzubaidi, Alistair Barros, Catarina Moreira | Published: 2024-07-16 | Updated: 2024-10-04
モデル性能評価
攻撃の評価
特徴の相互依存性

GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

Authors: Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti | Published: 2024-05-20
モデル性能評価
攻撃の評価
攻撃手法

Manipulating hidden-Markov-model inferences by corrupting batch data

Authors: William N. Caballero, Jose Manuel Camacho, Tahir Ekin, Roi Naveiro | Published: 2024-02-19
不確実性の定量化
攻撃の評価
攻撃手法

On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection

Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15
データセット生成
侵入検知システム
攻撃の評価

A Novel Evaluation Framework for Assessing Resilience Against Prompt Injection Attacks in Large Language Models

Authors: Daniel Wankit Yip, Aysan Esmradi, Chun Fai Chan | Published: 2024-01-02
LLMセキュリティ
プロンプトインジェクション
攻撃の評価

Label-Only Model Inversion Attacks via Knowledge Transfer

Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30
プライバシー手法
攻撃の評価
深層学習手法

SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang | Published: 2023-10-19
メンバーシップ推論
モデル抽出攻撃
攻撃の評価

Attack Prompt Generation for Red Teaming and Defending Large Language Models

Authors: Boyi Deng, Wenjie Wang, Fuli Feng, Yang Deng, Qifan Wang, Xiangnan He | Published: 2023-10-19
プロンプトインジェクション
攻撃の評価
敵対的サンプル

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17
プライバシー手法
モデル抽出攻撃
攻撃の評価

BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries

Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen | Published: 2023-10-14
攻撃の評価
敵対的サンプル
最適化手法