Picture for Michael Zuzak

Michael Zuzak

ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs

Add code
Oct 22, 2024
Figure 1 for ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Figure 2 for ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Figure 3 for ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Figure 4 for ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Viaarxiv icon

Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving

Add code
Apr 28, 2023
Figure 1 for Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Figure 2 for Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Figure 3 for Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Figure 4 for Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Viaarxiv icon

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators

Add code
Apr 14, 2023
Viaarxiv icon