ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2403.09751
  4. Cited By
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

14 March 2024
Roy Weiss
Daniel Ayzenshteyn
Guy Amit
Yisroel Mirsky
ArXivPDFHTML

Papers citing "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants"

10 / 10 papers shown
Title
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems
Linke Song
Zixuan Pang
Wenhao Wang
Zihao Wang
XiaoFeng Wang
Hongbo Chen
Wei Song
Yier Jin
Dan Meng
Rui Hou
88
8
0
30 Sep 2024
A Review and Comparison of AI Enhanced Side Channel Analysis
A Review and Comparison of AI Enhanced Side Channel Analysis
Max Panoff
H. Yu
Haoqi Shan
Yier Jin
AAML
24
16
0
03 Feb 2024
Quantifying Memorization Across Neural Language Models
Quantifying Memorization Across Neural Language Models
Nicholas Carlini
Daphne Ippolito
Matthew Jagielski
Katherine Lee
Florian Tramèr
Chiyuan Zhang
PILM
100
614
0
15 Feb 2022
The Pile: An 800GB Dataset of Diverse Text for Language Modeling
The Pile: An 800GB Dataset of Diverse Text for Language Modeling
Leo Gao
Stella Biderman
Sid Black
Laurence Golding
Travis Hoppe
...
Horace He
Anish Thite
Noa Nabeshima
Shawn Presser
Connor Leahy
AIMat
432
2,081
0
31 Dec 2020
MiniLM: Deep Self-Attention Distillation for Task-Agnostic Compression
  of Pre-Trained Transformers
MiniLM: Deep Self-Attention Distillation for Task-Agnostic Compression of Pre-Trained Transformers
Wenhui Wang
Furu Wei
Li Dong
Hangbo Bao
Nan Yang
Ming Zhou
VLM
122
1,260
0
25 Feb 2020
How to 0wn NAS in Your Spare Time
How to 0wn NAS in Your Spare Time
Sanghyun Hong
Michael Davinroy
Yigitcan Kaya
Dana Dachman-Soled
Tudor Dumitras
52
35
0
17 Feb 2020
Bicycle Attacks Considered Harmful: Quantifying the Damage of Widespread
  Password Length Leakage
Bicycle Attacks Considered Harmful: Quantifying the Damage of Widespread Password Length Leakage
B. Harsha
Robert Morton
Jeremiah Blocki
John A. Springer
M. Dark
15
7
0
04 Feb 2020
Exploring the Limits of Transfer Learning with a Unified Text-to-Text
  Transformer
Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer
Colin Raffel
Noam M. Shazeer
Adam Roberts
Katherine Lee
Sharan Narang
Michael Matena
Yanqi Zhou
Wei Li
Peter J. Liu
AIMat
375
20,053
0
23 Oct 2019
Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks
Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks
Nils Reimers
Iryna Gurevych
1.1K
12,129
0
27 Aug 2019
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN
  Architectures
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
Mengjia Yan
Christopher W. Fletcher
Josep Torrellas
MIACV
FedML
61
247
0
14 Aug 2018
1