no code implementations • 6 Jan 2024 • Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang
The underground exploitation of large language models (LLMs) for malicious services (i. e., Malla) is witnessing an uptick, amplifying the cyber threat landscape and posing questions about the trustworthiness of LLM technologies.
no code implementations • 22 Apr 2023 • Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu
As a prominent instance of vandalism edits, Wiki search poisoning for illicit promotion is a cybercrime in which the adversary aims at editing Wiki articles to promote illicit businesses through Wiki search results of relevant queries.
no code implementations • 6 Sep 2018 • Zilong Lin, Yong Shi, Zhi Xue
Given that the internal structure and parameters of the detection system are unknown to attackers, the adversarial attack examples perform the black-box attacks against the detection system.