攻撃手法

Low-Cost High-Power Membership Inference Attacks

Authors: Sajjad Zarifzadeh, Philippe Liu, Reza Shokri | Published: 2023-12-06 | Updated: 2024-06-12
メンバーシップ推論
低コストのメンバシップ推論手法
攻撃手法

Breaking XOR Arbiter PUFs without Reliability Information

Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03
PUFの評価手法
ウォーターマーキング
攻撃手法

FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework

Authors: Sheldon C. Ebron Jr., Kan Yang | Published: 2023-11-17
モデルアーキテクチャ
攻撃手法
評価手法

You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks

Authors: Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze | Published: 2023-11-16 | Updated: 2023-12-19
ルール帰属
攻撃手法
適応型誤用検出

Trojan Activation Attack: Red-Teaming Large Language Models using Activation Steering for Safety-Alignment

Authors: Haoran Wang, Kai Shu | Published: 2023-11-15 | Updated: 2024-08-15
プロンプトインジェクション
攻撃手法
自然言語処理

Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts

Authors: Yuanwei Wu, Xiang Li, Yixin Liu, Pan Zhou, Lichao Sun | Published: 2023-11-15 | Updated: 2024-01-20
プロンプトインジェクション
攻撃手法
顔認識

Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications

Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2023-11-07 | Updated: 2023-11-29
プロンプトインジェクション
実験的検証
攻撃手法

Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition

Authors: Sander Schulhoff, Jeremy Pinto, Anaum Khan, Louis-François Bouchard, Chenglei Si, Svetlina Anati, Valen Tagliabue, Anson Liu Kost, Christopher Carnahan, Jordan Boyd-Graber | Published: 2023-10-24 | Updated: 2024-03-03
テキスト生成手法
プロンプトインジェクション
攻撃手法

Deceptive Fairness Attacks on Graphs via Meta Learning

Authors: Jian Kang, Yinglong Xia, Ross Maciejewski, Jiebo Luo, Hanghang Tong | Published: 2023-10-24
GNN
攻撃手法
評価指標

AutoDAN: Interpretable Gradient-Based Adversarial Attacks on Large Language Models

Authors: Sicheng Zhu, Ruiyi Zhang, Bang An, Gang Wu, Joe Barrow, Zichao Wang, Furong Huang, Ani Nenkova, Tong Sun | Published: 2023-10-23 | Updated: 2023-12-14
プロンプトインジェクション
安全性アライメント
攻撃手法