“Yes, My LoRD.” Guiding Language Model Extraction with Locality Reinforced Distillation Authors: Zi Liang, Qingqing Ye, Yanyun Wang, Sen Zhang, Yaxin Xiao, Ronghua Li, Jianliang Xu, Haibo Hu | Published: 2024-09-04 | Updated: 2025-05-19 LLM SecurityModel Extraction AttackWatermarking Technology 2024.09.04 2025.05.28 Literature Database
AdvSecureNet: A Python Toolkit for Adversarial Machine Learning Authors: Melih Catal, Manuel Günther | Published: 2024-09-04 Toolkit ComparisonAdversarial TrainingEvaluation Method 2024.09.04 2025.05.27 Literature Database
Adversarial Attacks on Machine Learning-Aided Visualizations Authors: Takanori Fujiwara, Kostiantyn Kucher, Junpeng Wang, Rafael M. Martins, Andreas Kerren, Anders Ynnerman | Published: 2024-09-04 | Updated: 2024-09-24 Backdoor AttackAdversarial ExampleVulnerability of Visualization 2024.09.04 2025.05.27 Literature Database
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer Authors: Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu | Published: 2024-09-03 LLM Performance EvaluationCybersecurityPrompt Injection 2024.09.03 2025.05.27 Literature Database
Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural Backdoor Authors: Abdullah Arafat Miah, Yu Bi | Published: 2024-09-03 | Updated: 2024-09-09 Backdoor AttackModel Performance Evaluation 2024.09.03 2025.05.27 Literature Database
DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts Authors: Ismael Medeiros, Fausto Carvalho, Alexandre Ferreira, Rodrigo Bonifácio, Fabiano Cavalcanti Fernandes | Published: 2024-09-03 Smart ContractBlockchain TechnologyEvaluation Method 2024.09.03 2025.05.27 Literature Database
Safeguarding AI Agents: Developing and Analyzing Safety Architectures Authors: Ishaan Domkundwar, Mukunda N S, Ishaan Bhola | Published: 2024-09-03 | Updated: 2024-09-13 Content ModerationInternal Review SystemSafety Alignment 2024.09.03 2025.05.27 Literature Database
The Role of Transformer Models in Advancing Blockchain Technology: A Systematic Survey Authors: Tianxu Liu, Yanbin Wang, Jianguo Sun, Ye Tian, Yanyu Huang, Tao Xue, Peiyue Li, Yiwei Liu | Published: 2024-09-02 | Updated: 2024-09-05 Smart ContractProgram AnalysisBlockchain Technology 2024.09.02 2025.05.27 Literature Database
Membership Inference Attacks Against In-Context Learning Authors: Rui Wen, Zheng Li, Michael Backes, Yang Zhang | Published: 2024-09-02 Prompt InjectionMembership InferenceAttack Method 2024.09.02 2025.05.27 Literature Database
Poster: Developing an O-RAN Security Test Lab Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02 WatermarkingCybersecuritySecurity Analysis 2024.09.02 2025.05.27 Literature Database