Agent Smith: A Single Image Can Jailbreak One Million Multimodal LLM Agents Exponentially Fast Authors: Xiangming Gu, Xiaosen Zheng, Tianyu Pang, Chao Du, Qian Liu, Ye Wang, Jing Jiang, Min Lin | Published: 2024-02-13 | Updated: 2024-06-03 LLM SecurityPrompt InjectionAdversarial Attack Detection 2024.02.13 2025.05.27 Literature Database
ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13 CybersecurityData CollectionIntrusion Detection System 2024.02.13 2025.05.27 Literature Database
Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning Authors: Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu | Published: 2024-02-13 LLM SecurityPrompt InjectionMalicious Content Generation 2024.02.13 2025.05.27 Literature Database
Data Reconstruction Attacks and Defenses: A Systematic Evaluation Authors: Sheng Liu, Zihan Wang, Yuxiao Chen, Qi Lei | Published: 2024-02-13 | Updated: 2025-03-22 Privacy AnalysisModel RobustnessAdversarial attack 2024.02.13 2025.05.27 Literature Database
CycPUF: Cyclic Physical Unclonable Function Authors: Michael Dominguez, Amin Rezaei | Published: 2024-02-12 FPGAEvaluation Methods for PUFWatermark Evaluation 2024.02.12 2025.05.27 Literature Database
Locality Sensitive Hashing for Network Traffic Fingerprinting Authors: Nowfel Mashnoor, Jay Thom, Abdur Rouf, Shamik Sengupta, Batyr Charyyev | Published: 2024-02-12 IoT Device IdentificationParameter TuningFingerprinting Method 2024.02.12 2025.05.27 Literature Database
Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector Authors: He Shuang, Lianying Zhao, David Lie | Published: 2024-02-12 | Updated: 2024-09-12 Tracking Detection 2024.02.12 2025.05.27 Literature Database
PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models Authors: Wei Zou, Runpeng Geng, Binghui Wang, Jinyuan Jia | Published: 2024-02-12 | Updated: 2024-08-13 Prompt InjectionPoisoningPoisoning Attack 2024.02.12 2025.05.27 Literature Database
Integrating MLSecOps in the Biotechnology Industry 5.0 Authors: Naseela Pervez, Alexander J. Titus | Published: 2024-02-12 Role of MLSecOpsBiotechnology SecurityImportance of Regulation 2024.02.12 2025.05.27 Literature Database
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge Authors: Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamas Bisztray, Merouane Debbah | Published: 2024-02-12 | Updated: 2024-06-03 LLM Performance EvaluationCybersecurityDataset Generation 2024.02.12 2025.05.27 Literature Database