Amplifying Machine Learning Attacks Through Strategic Compositions Authors: Yugeng Liu, Zheng Li, Hai Huang, Michael Backes, Yang Zhang | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Authors: Lei Yu, Zhirong Huang, Hang Yuan, Shiqi Cheng, Li Yang, Fengjun Zhang, Chenjie Shen, Jiajia Ma, Jingyuan Zhang, Junyi Lu, Chun Zuo | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Amplifying Machine Learning Attacks Through Strategic Compositions Authors: Yugeng Liu, Zheng Li, Hai Huang, Michael Backes, Yang Zhang | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Authors: Lei Yu, Zhirong Huang, Hang Yuan, Shiqi Cheng, Li Yang, Fengjun Zhang, Chenjie Shen, Jiajia Ma, Jingyuan Zhang, Junyi Lu, Chun Zuo | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database