AuditGPT: Auditing Smart Contracts with ChatGPT Authors: Shihao Xia, Shuai Shao, Mengting He, Tingting Yu, Linhai Song, Yiying Zhang | Published: 2024-04-05 ERC RulesERC Compliance EvaluationPrompt Injection 2024.04.05 2025.05.27 Literature Database
An Investigation into Misuse of Java Security APIs by Large Language Models Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar | Published: 2024-04-04 Misuse of Security APISecurity AnalysisPrompt Injection 2024.04.04 2025.05.27 Literature Database
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning Authors: Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue | Published: 2024-04-04 WatermarkingMembership InferenceLabel Inference Attack 2024.04.04 2025.05.27 Literature Database
Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07 WatermarkingModel Performance EvaluationComputational Efficiency 2024.04.04 2025.05.27 Literature Database
Goldfish: An Efficient Federated Unlearning Framework Authors: Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves-Veríssimo | Published: 2024-04-04 | Updated: 2024-04-23 Model Performance EvaluationLoss FunctionFederated Learning 2024.04.04 2025.05.27 Literature Database
“Are Adversarial Phishing Webpages a Threat in Reality?” Understanding the Users’ Perception of Adversarial Webpages Authors: Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang | Published: 2024-04-03 Phishing AttackDetection Rate of Phishing AttacksPhishing Detection 2024.04.03 2025.05.27 Literature Database
LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04 WatermarkingSecurity AnalysisAnomaly Detection Method 2024.04.03 2025.05.27 Literature Database
Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03 WatermarkingPhysical layer securityWatermark Evaluation 2024.04.03 2025.05.27 Literature Database
Exploring Backdoor Vulnerabilities of Chat Models Authors: Yunzhuo Hao, Wenkai Yang, Yankai Lin | Published: 2024-04-03 Backdoor AttackPrompt Injection 2024.04.03 2025.05.27 Literature Database
Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis Authors: S M Rakib Hasan, Aakar Dhakal | Published: 2024-04-03 CybersecurityPrompt InjectionMalware Classification 2024.04.03 2025.05.27 Literature Database