Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trojllm: A black-box trojan prompt attack on large language models
Abstract Large Language Models (LLMs) are progressively being utilized as machine
learning services and interface tools for various applications. However, the security …
learning services and interface tools for various applications. However, the security …
Rowpress: Amplifying read disturbance in modern dram chips
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
A survey of bit-flip attacks on deep neural network and corresponding defense methods
C Qian, M Zhang, Y Nie, S Lu, H Cao - Electronics, 2023 - mdpi.com
As the machine learning-related technology has made great progress in recent years, deep
neural networks are widely used in many scenarios, including security-critical ones, which …
neural networks are widely used in many scenarios, including security-critical ones, which …
You are catching my attention: Are vision transformers bad learners under backdoor attacks?
Abstract Vision Transformers (ViTs), which made a splash in the field of computer vision
(CV), have shaken the dominance of convolutional neural networks (CNNs). However, in the …
(CV), have shaken the dominance of convolutional neural networks (CNNs). However, in the …
Not all prompts are secure: A switchable backdoor attack against pre-trained vision transfomers
Given the power of vision transformers a new learning paradigm pre-training and then
prompting makes it more efficient and effective to address downstream visual recognition …
prompting makes it more efficient and effective to address downstream visual recognition …
Fundamentally understanding and solving rowhammer
We provide an overview of recent developments and future directions in the RowHammer
vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which …
vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which …
CoMeT: Count-Min-Sketch-based Row Tracking to Mitigate RowHammer at Low Cost
DRAM chips are increasingly more vulnerable to read-disturbance phenomena (eg,
RowHammer and RowPress), where repeatedly accessing DRAM rows causes bitflips in …
RowHammer and RowPress), where repeatedly accessing DRAM rows causes bitflips in …
{ABACuS}:{All-Bank} Activation Counters for Scalable and Low Overhead {RowHammer} Mitigation
We introduce ABACuS, a new low-cost hardware-counterbased RowHammer mitigation
technique that performance-, energy-, and area-efficiently scales with worsening …
technique that performance-, energy-, and area-efficiently scales with worsening …
DRAM bender: An extensible and versatile FPGA-based infrastructure to easily test state-of-the-art DRAM chips
To understand and improve DRAM performance, reliability, security, and energy efficiency,
prior works study characteristics of commodity DRAM chips. Unfortunately, state-of-the-art …
prior works study characteristics of commodity DRAM chips. Unfortunately, state-of-the-art …
Forget and Rewire: Enhancing the Resilience of Transformer-based Models against {Bit-Flip} Attacks
Bit-Flip Attacks (BFAs) involve adversaries manipulating a model's parameter bits to
undermine its accuracy significantly. They typically target the most vulnerable parameters …
undermine its accuracy significantly. They typically target the most vulnerable parameters …