Picture for Ben Nassi

Ben Nassi

Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking

Add code
Sep 12, 2024
Viaarxiv icon

A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares

Add code
Aug 09, 2024
Figure 1 for A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares
Figure 2 for A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares
Figure 3 for A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares
Figure 4 for A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares
Viaarxiv icon

The Adversarial Implications of Variable-Time Inference

Add code
Sep 05, 2023
Figure 1 for The Adversarial Implications of Variable-Time Inference
Figure 2 for The Adversarial Implications of Variable-Time Inference
Figure 3 for The Adversarial Implications of Variable-Time Inference
Figure 4 for The Adversarial Implications of Variable-Time Inference
Viaarxiv icon

(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

Add code
Jul 24, 2023
Viaarxiv icon

Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models

Add code
Nov 24, 2022
Viaarxiv icon

EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome

Add code
May 13, 2022
Figure 1 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 2 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 3 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Figure 4 for EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome
Viaarxiv icon

Handwritten Signature Verification Using Hand-Worn Devices

Add code
Dec 19, 2016
Figure 1 for Handwritten Signature Verification Using Hand-Worn Devices
Figure 2 for Handwritten Signature Verification Using Hand-Worn Devices
Figure 3 for Handwritten Signature Verification Using Hand-Worn Devices
Figure 4 for Handwritten Signature Verification Using Hand-Worn Devices
Viaarxiv icon