Transfer Attacks and Defenses for Large Language Models on Coding Tasks Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu | Published: 2023-11-22 プロンプトインジェクション敵対的攻撃防御手法 2023.11.22 2025.04.03 文献データベース
Adversarial Purification for Data-Driven Power System Event Classifiers with Diffusion Models Authors: Yuanbin Cheng, Koji Yamashita, Jim Follum, Nanpeng Yu | Published: 2023-11-13 敵対的テキスト浄化最適化問題防御手法 2023.11.13 2025.04.03 文献データベース
Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11 学習の改善深層学習手法防御手法 2023.11.11 2025.04.03 文献データベース
Does Differential Privacy Prevent Backdoor Attacks in Practice? Authors: Fereshteh Razmi, Jian Lou, Li Xiong | Published: 2023-11-10 データプライバシー評価トレードオフ分析防御手法 2023.11.10 2025.04.03 文献データベース
Input Reconstruction Attack against Vertical Federated Large Language Models Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24 VFLの特性プライバシー保護防御手法 2023.11.07 2025.04.03 文献データベース
PubDef: Defending Against Transfer Attacks From Public Models Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17 敵対的攻撃敵対的訓練防御手法 2023.10.26 2025.04.03 文献データベース
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses Authors: Caelin G. Kaplan, Chuan Xu, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira | Published: 2023-10-18 プライバシー保護手法プライバシー手法防御手法 2023.10.18 2025.04.03 文献データベース
Assessing Robustness via Score-Based Adversarial Image Generation Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06 データ生成実験的検証防御手法 2023.10.06 2025.04.03 文献データベース
SmoothLLM: Defending Large Language Models Against Jailbreaking Attacks Authors: Alexander Robey, Eric Wong, Hamed Hassani, George J. Pappas | Published: 2023-10-05 | Updated: 2024-06-11 LLM性能評価プロンプトインジェクション防御手法 2023.10.05 2025.04.03 文献データベース
Breaking On-Chip Communication Anonymity using Flow Correlation Attacks Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2024-02-01 性能評価流量相関攻撃防御手法 2023.09.27 2025.04.03 文献データベース