Media Summary: Quantifying Privacy Risks of Prompts in Visual A Linear Reconstruction Approach for Attribute Inference PentestGPT: Evaluating and Harnessing Large Language

Usenix Security 24 Prompt Stealing Attacks Against Text To Image Generation Models - Detailed Analysis & Overview

Quantifying Privacy Risks of Prompts in Visual A Linear Reconstruction Approach for Attribute Inference PentestGPT: Evaluating and Harnessing Large Language

Photo Gallery

USENIX Security '24 - Prompt Stealing Attacks Against Text-to-Image Generation Models
USENIX Security '24 - Quantifying Privacy Risks of Prompts in Visual Prompt Learning
USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models
USENIX Security '24 - What Was Your Prompt? A Remote Keylogging Attack on AI Assistants
USENIX Security '24 - Formalizing and Benchmarking Prompt Injection Attacks and Defenses
USENIX Security '24 - Towards More Practical Threat Models in Artificial Intelligence Security
USENIX Security '24 - Rethinking the Invisible Protection against Unauthorized Image Usage in...
USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection
USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...
USENIX Security '24 - PentestGPT: Evaluating and Harnessing Large Language Models for Automated...
USENIX Security '23 - A Plot is Worth a Thousand Words: Model Information Stealing Attacks via...
USENIX Security '21 - Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
Sponsored
View Detailed Profile
USENIX Security '24 - Prompt Stealing Attacks Against Text-to-Image Generation Models

USENIX Security '24 - Prompt Stealing Attacks Against Text-to-Image Generation Models

Prompt Stealing Attacks Against Text

USENIX Security '24 - Quantifying Privacy Risks of Prompts in Visual Prompt Learning

USENIX Security '24 - Quantifying Privacy Risks of Prompts in Visual Prompt Learning

Quantifying Privacy Risks of Prompts in Visual

USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models

USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models

USENIX Security

USENIX Security '24 - What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

USENIX Security '24 - What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

What Was Your

USENIX Security '24 - Formalizing and Benchmarking Prompt Injection Attacks and Defenses

USENIX Security '24 - Formalizing and Benchmarking Prompt Injection Attacks and Defenses

Formalizing and Benchmarking

Sponsored
USENIX Security '24 - Towards More Practical Threat Models in Artificial Intelligence Security

USENIX Security '24 - Towards More Practical Threat Models in Artificial Intelligence Security

Towards More Practical Threat

USENIX Security '24 - Rethinking the Invisible Protection against Unauthorized Image Usage in...

USENIX Security '24 - Rethinking the Invisible Protection against Unauthorized Image Usage in...

Rethinking the Invisible Protection

USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection

USENIX Security '24 - EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection

EaTVul: ChatGPT-based Evasion Attack

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

USENIX Security '24 - A Linear Reconstruction Approach for Attribute Inference Attacks against...

A Linear Reconstruction Approach for Attribute Inference

USENIX Security '24 - PentestGPT: Evaluating and Harnessing Large Language Models for Automated...

USENIX Security '24 - PentestGPT: Evaluating and Harnessing Large Language Models for Automated...

PentestGPT: Evaluating and Harnessing Large Language

USENIX Security '23 - A Plot is Worth a Thousand Words: Model Information Stealing Attacks via...

USENIX Security '23 - A Plot is Worth a Thousand Words: Model Information Stealing Attacks via...

USENIX Security

USENIX Security '21 - Hermes Attack: Steal DNN Models with Lossless Inference Accuracy

USENIX Security '21 - Hermes Attack: Steal DNN Models with Lossless Inference Accuracy

USENIX Security

USENIX Security '23 - GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI

USENIX Security '23 - GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI

USENIX Security