Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security Authors: Yihe Fan, Yuxin Cao, Ziyu Zhao, Ziyao Liu, Shaofeng Li | Published: 2024-04-08 | Updated: 2024-08-11 LLM SecurityPrompt InjectionThreat modeling 2024.04.08 2025.05.27 Literature Database
Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning Authors: Yu Bi, Yekai Li, Xuan Feng, Xianghang Mi | Published: 2024-04-08 Spam DetectionPoisoningFederated Learning 2024.04.08 2025.05.27 Literature Database
Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4 Authors: Bishwas Mandal, George Amariucai, Shuangqing Wei | Published: 2024-04-07 Data Privacy AssessmentPrivacy Protection MethodPrompt Injection 2024.04.07 2025.05.27 Literature Database
Contextual Chart Generation for Cyber Deception Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba | Published: 2024-04-07 Data PreprocessingModel DesignEvaluation Method 2024.04.07 2025.05.27 Literature Database
PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics Authors: Derui Zhu, Dingfan Chen, Qing Li, Zongxiong Chen, Lei Ma, Jens Grossklags, Mario Fritz | Published: 2024-04-06 LLM SecurityLLM Performance EvaluationEvaluation Method 2024.04.06 2025.05.27 Literature Database
Advances in Differential Privacy and Differentially Private Machine Learning Authors: Saswat Das, Subhankar Mishra | Published: 2024-04-06 WatermarkingData Privacy AssessmentPrivacy Protection Method 2024.04.06 2025.05.27 Literature Database
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems Authors: Francesco Marchiori, Mauro Conti | Published: 2024-04-06 Intrusion Detection SystemAdversarial TrainingThreat modeling 2024.04.06 2025.05.27 Literature Database
Optimization of Lightweight Malware Detection Models For AIoT Devices Authors: Felicia Lo, Shin-Ming Cheng, Rafael Kaliski | Published: 2024-04-06 Membership InferenceModel Performance EvaluationResource optimization 2024.04.06 2025.05.27 Literature Database
Fine-Tuning, Quantization, and LLMs: Navigating Unintended Outcomes Authors: Divyanshu Kumar, Anurakt Kumar, Sahil Agarwal, Prashanth Harshangi | Published: 2024-04-05 | Updated: 2024-09-09 LLM SecurityPrompt InjectionSafety Alignment 2024.04.05 2025.05.27 Literature Database
Prompt Public Large Language Models to Synthesize Data for Private On-device Applications Authors: Shanshan Wu, Zheng Xu, Yanxiang Zhang, Yuanbo Zhang, Daniel Ramage | Published: 2024-04-05 | Updated: 2024-08-07 Dataset GenerationPrivacy Protection MethodFederated Learning 2024.04.05 2025.05.27 Literature Database