What is in Your Safe Data? Identifying Benign Data that Breaks Safety Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20 Data Selection StrategyPrompt InjectionPsychological Manipulation 2024.04.01 2025.05.27 Literature Database
Can LLMs get help from other LLMs without revealing private information? Authors: Florian Hartmann, Duc-Hieu Tran, Peter Kairouz, Victor Cărbune, Blaise Aguera y Arcas | Published: 2024-04-01 | Updated: 2024-04-02 LLM SecurityPrivacy ProtectionPrivacy Protection Method 2024.04.01 2025.05.27 Literature Database
On Large Language Models’ Hallucination with Regard to Known Facts Authors: Che Jiang, Biqing Qi, Xiangyu Hong, Dayuan Fu, Yang Cheng, Fandong Meng, Mo Yu, Bowen Zhou, Jie Zhou | Published: 2024-03-29 | Updated: 2024-10-28 HallucinationDetection of HallucinationsModel Architecture 2024.03.29 2025.05.27 Literature Database
A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07 Dataset GenerationBackdoor AttackPoisoning 2024.03.29 2025.05.27 Literature Database
Detecting Financial Bots on the Ethereum Blockchain Authors: Thomas Niedermayer, Pietro Saggese, Bernhard Haslhofer | Published: 2024-03-28 | Updated: 2025-01-02 Blockchain TechnologyTransaction FlowFinancial Intelligence 2024.03.28 2025.05.27 Literature Database
Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications Authors: Fouad Trad, Ali Chehab | Published: 2024-03-26 | Updated: 2024-06-10 Evolution of AIPrompt EngineeringMalware Classification 2024.03.26 2025.05.27 Literature Database
To Err is Machine: Vulnerability Detection Challenges LLM Reasoning Authors: Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Hengbo Tong, Swarna Das, Earl T. Barr, Wei Le | Published: 2024-03-25 | Updated: 2025-01-07 DoS MitigationLLM SecurityPrompt Injection 2024.03.25 2025.05.27 Literature Database
Deciphering the Interplay between Local Differential Privacy, Average Bayesian Privacy, and Maximum Bayesian Privacy Authors: Xiaojin Zhang, Yulin Fei, Wei Chen | Published: 2024-03-25 | Updated: 2024-04-02 WatermarkingPrivacy Protection MethodPrivacy Classification 2024.03.25 2025.05.27 Literature Database
Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training Authors: Shuai Zhao, Linchao Zhu, Ruijie Quan, Yi Yang | Published: 2024-03-23 | Updated: 2024-08-12 WatermarkingMembership InferenceWatermark Evaluation 2024.03.23 2025.05.27 Literature Database
Large Language Models for Blockchain Security: A Systematic Literature Review Authors: Zheyuan He, Zihao Li, Sen Yang, He Ye, Ao Qiao, Xiaosong Zhang, Xiapu Luo, Ting Chen | Published: 2024-03-21 | Updated: 2025-03-24 LLM SecurityAlgorithmBlockchain Technology 2024.03.21 2025.05.27 Literature Database