脆弱性攻撃手法

Systematic Categorization, Construction and Evaluation of New Attacks against Multi-modal Mobile GUI Agents

Authors: Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang | Published: 2024-07-12 | Updated: 2025-03-16
インダイレクトプロンプトインジェクション
攻撃手法
脆弱性攻撃手法

Talking Trojan: Analyzing an Industry-Wide Disclosure

Authors: Nicholas Boucher, Ross Anderson | Published: 2022-09-22
オープンソース開示
セキュリティラベル
脆弱性攻撃手法

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16
データセット評価
脆弱性攻撃手法
評価手法

RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14
ポイズニング
脆弱性攻撃手法
防御手法

Pixle: a fast and effective black-box attack based on rearranging pixels

Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04
敵対的攻撃検出
脆弱性攻撃手法
防御手法

Simple Transparent Adversarial Examples

Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20
ウォーターマーキング
敵対的攻撃
脆弱性攻撃手法

A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks

Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13
ポイズニング
敵対的攻撃手法
脆弱性攻撃手法

Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26
トレーニング手法
状態遷移モデル
脆弱性攻撃手法

Diversity can be Transferred: Output Diversification for White- and Black-box Attacks

Authors: Yusuke Tashiro, Yang Song, Stefano Ermon | Published: 2020-03-15 | Updated: 2020-10-30
ポイズニング
敵対的攻撃手法
脆弱性攻撃手法

Certified Defenses for Adversarial Patches

Authors: Ping-Yeh Chiang, Renkun Ni, Ahmed Abdelkader, Chen Zhu, Christoph Studer, Tom Goldstein | Published: 2020-03-14 | Updated: 2020-09-25
ロバスト性
脆弱性攻撃手法
防御手法