Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Watch out for your agents! investigating backdoor threats to llm-based agents
Driven by the rapid development of Large Language Models (LLMs), LLM-based agents
have been developed to handle various real-world applications, including finance …
have been developed to handle various real-world applications, including finance …
Cooperative Backdoor Attack in Decentralized Reinforcement Learning with Theoretical Guarantee
The safety of decentralized reinforcement learning (RL) is a challenging problem since
malicious agents can share their poisoned policies with benign agents. The paper …
malicious agents can share their poisoned policies with benign agents. The paper …
Combinational Backdoor Attack against Customized Text-to-Image Models
Recently, Text-to-Image (T2I) synthesis technology has made tremendous strides.
Numerous representative T2I models have emerged and achieved promising application …
Numerous representative T2I models have emerged and achieved promising application …
BLAST: A Stealthy Backdoor Leverage Attack against Cooperative Multi-Agent Deep Reinforcement Learning based Systems
Recent studies have shown that cooperative multi-agent deep reinforcement learning (c-
MADRL) is under the threat of backdoor attacks. Once a backdoor trigger is observed, it will …
MADRL) is under the threat of backdoor attacks. Once a backdoor trigger is observed, it will …
Robustness Evaluation of Offline Reinforcement Learning for Robot Control Against Action Perturbations
S Ayabe, T Otomo, H Kera, K Kawamoto - arxiv preprint arxiv:2412.18781, 2024 - arxiv.org
Offline reinforcement learning, which learns solely from datasets without environmental
interaction, has gained attention. This approach, similar to traditional online deep …
interaction, has gained attention. This approach, similar to traditional online deep …
无人系统中离线**化学**的隐蔽数据投毒攻击方法
周雪, 苘大鹏, 许晨, 吕继光, 曾凡一, 高朝阳… - 通信学报, 2024 - infocomm-journal.com
针对现有离线**化学**数据投毒攻击方法有效性及隐蔽性不足的问题, 提出一种关键时间步动态
投毒攻击方法, 通过对重要性较高的样本进行动态扰动, 实现高效隐蔽的攻击效果. 具体来说 …
投毒攻击方法, 通过对重要性较高的样本进行动态扰动, 实现高效隐蔽的攻击效果. 具体来说 …
Towards robust, secure, and privacy-aware large language models of code
Z YANG - 2024 - ink.library.smu.edu.sg
The field of software engineering has witnessed a surge in large language models
specifically tailored to understand and process code, which we call large language models …
specifically tailored to understand and process code, which we call large language models …
Temporal Logic-Based Multi-Vehicle Backdoor Attacks against Offline RL Agents in End-to-end Autonomous Driving
End-to-end autonomous driving (AD) systems integrate complex decision-making
processes. Assessing the safety of these systems against potential security threats, including …
processes. Assessing the safety of these systems against potential security threats, including …