クエリ生成手法

Automated Static Vulnerability Detection via a Holistic Neuro-symbolic Approach

Authors: Penghui Li, Songchen Yao, Josef Sarfati Korich, Changhua Luo, Jianjia Yu, Yinzhi Cao, Junfeng Yang | Published: 2025-04-22
クエリ生成手法
プロンプトインジェクション
脆弱性検出

BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models

Authors: Jiaqi Xue, Mengxin Zheng, Yebowen Hu, Fei Liu, Xun Chen, Qian Lou | Published: 2024-06-03 | Updated: 2024-06-06
LLM性能評価
クエリの多様性
クエリ生成手法

ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models

Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10
クエリ生成手法
フィンガープリンティング手法
プロンプトインジェクション

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31
クエリ生成手法
プロンプトインジェクション
透かし評価

DualCF: Efficient Model Extraction Attack from Counterfactual Explanations

Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13
DFLに対する攻撃手法
クエリ生成手法
攻撃手法

Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks

Authors: Francesco Croce, Maksym Andriushchenko, Naman D. Singh, Nicolas Flammarion, Matthias Hein | Published: 2020-06-23 | Updated: 2022-02-08
クエリ生成手法
強化学習
敵対的攻撃手法

Simple Black-box Adversarial Attacks

Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15
クエリ生成手法
性能評価手法
敵対的訓練

Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization

Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18
クエリ生成手法
ポイズニング
最適化手法

Query-Efficient Black-Box Attack by Active Learning

Authors: Pengcheng Li, Jinfeng Yi, Lijun Zhang | Published: 2018-09-13
クエリ生成手法
モデルの頑健性保証
敵対的攻撃

Towards Query Efficient Black-box Attacks: An Input-free Perspective

Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09
クエリ生成手法
トリガーの検知
ポイズニング