No Two Devils Alike: Unveiling Distinct Mechanisms of Fine-tuning Attacks.
Chak Tou LeongYi ChengKaishuai XuJian WangHanlin WangWenjie LiPublished in: CoRR (2024)
Keyphrases
- fine tuning
- viable alternative
- security mechanisms
- defense mechanisms
- fine tuned
- fine tune
- mechanism design
- traffic analysis
- security threats
- mechanisms underlying
- genetic algorithm
- computer security
- closely related
- cyber attacks
- resource constrained
- countermeasures
- security risks
- malicious attacks
- terrorist attacks
- watermarking scheme
- malicious users