Survey of vulnerabilities in large language models revealed by adversarial attacks
Large Language Models (LLMs) are swiftly advancing in architecture and capability, and as
they integrate more deeply into complex systems, the urgency to scrutinize their security …
they integrate more deeply into complex systems, the urgency to scrutinize their security …
Defense strategies for adversarial machine learning: A survey
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
deceive Machine Learning (ML) models by providing falsified inputs to render those models …
Not what you've signed up for: Compromising real-world llm-integrated applications with indirect prompt injection
Large Language Models (LLMs) are increasingly being integrated into applications, with
versatile functionalities that can be easily modulated via natural language prompts. So far, it …
versatile functionalities that can be easily modulated via natural language prompts. So far, it …
Prompt Injection attack against LLM-integrated Applications
Large Language Models (LLMs), renowned for their superior proficiency in language
comprehension and generation, stimulate a vibrant ecosystem of applications around them …
comprehension and generation, stimulate a vibrant ecosystem of applications around them …
Jailbreaker: Automated jailbreak across multiple large language model chatbots
Large Language Models (LLMs) have revolutionized Artificial Intelligence (AI) services due
to their exceptional proficiency in understanding and generating human-like text. LLM …
to their exceptional proficiency in understanding and generating human-like text. LLM …
[PDF][PDF] Tree of attacks: Jailbreaking black-box llms automatically
Abstract While Large Language Models (LLMs) display versatile functionality, they continue
to generate harmful, biased, and toxic content, as demonstrated by the prevalence of …
to generate harmful, biased, and toxic content, as demonstrated by the prevalence of …
A survey on malware detection with graph representation learning
T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024 - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …
complexity of malware. Traditional detection methods based on signatures and heuristics …
[PDF][PDF] Masterkey: Automated jailbreaking of large language model chatbots
Large language models (LLMs), such as chatbots, have made significant strides in various
fields but remain vulnerable to jailbreak attacks, which aim to elicit inappropriate responses …
fields but remain vulnerable to jailbreak attacks, which aim to elicit inappropriate responses …
[HTML][HTML] Adversarial machine learning in industry: A systematic literature review
Abstract Adversarial Machine Learning (AML) discusses the act of attacking and defending
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …
Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML …
Towards more practical threat models in artificial intelligence security
Recent works have identified a gap between research and practice in artificial intelligence
security: threats studied in academia do not always reflect the practical use and security …
security: threats studied in academia do not always reflect the practical use and security …