Malla: Demystifying Real-world Large Language Model Integrated Malicious Services Authors: Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang | Published: 2024-01-06 | Updated: 2024-08-19 Phishing AttackPrompt InjectionMalicious Content Generation 2024.01.06 2025.05.27 Literature Database
The Dawn After the Dark: An Empirical Study on Factuality Hallucination in Large Language Models Authors: Junyi Li, Jie Chen, Ruiyang Ren, Xiaoxue Cheng, Wayne Xin Zhao, Jian-Yun Nie, Ji-Rong Wen | Published: 2024-01-06 LLM HallucinationHallucinationDetection of Hallucinations 2024.01.06 2025.05.27 Literature Database
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack Authors: Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang | Published: 2024-01-05 Backdoor AttackMalware ClassificationModel Performance Evaluation 2024.01.05 2025.05.27 Literature Database
Evasive Hardware Trojan through Adversarial Power Trace Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani | Published: 2024-01-04 WatermarkingAdversarial attackWatermark Robustness 2024.01.04 2025.05.27 Literature Database
Adaptive Differential Privacy in Federated Learning: A Priority-Based Approach Authors: Mahtab Talaei, Iman Izadi | Published: 2024-01-04 Privacy ProtectionPrivacy Protection MethodFederated Learning 2024.01.04 2025.05.27 Literature Database
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams | Published: 2024-01-03 CybersecurityAttack MethodTime-Related Features 2024.01.03 2025.05.27 Literature Database
Locally Differentially Private Embedding Models in Distributed Fraud Prevention Systems Authors: Iker Perez, Jason Wong, Piotr Skalski, Stuart Burrell, Richard Mortier, Derek McAuley, David Sutton | Published: 2024-01-03 Privacy ProtectionPrivacy Protection MethodFraudulent Transaction 2024.01.03 2025.05.27 Literature Database
User authentication system based on human exhaled breath physics Authors: Mukesh Karunanethy, Rahul Tripathi, Mahesh V Panchagnula, Raghunathan Rengaswamy | Published: 2024-01-02 User Authentication SystemTime-Related FeaturesMachine Learning Method 2024.01.02 2025.05.27 Literature Database
Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles Authors: Sagar Dasgupta, Kazi Hassan Shakib, Mizanur Rahman | Published: 2024-01-02 GNSS SecurityLSTM Model Performance EvaluationVulnerabilities in Autonomous Driving Technology 2024.01.02 2025.05.27 Literature Database
LLbezpeky: Leveraging Large Language Models for Vulnerability Detection Authors: Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh | Published: 2024-01-02 | Updated: 2024-02-13 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.01.02 2025.05.27 Literature Database