MIA-Tuner: Adapting Large Language Models as Pre-training Text Detector Authors: Wenjie Fu, Huandong Wang, Chen Gao, Guanghua Liu, Yong Li, Tao Jiang | Published: 2024-08-16 LLM SecurityPrompt InjectionMembership Inference 2024.08.16 2025.05.27 Literature Database
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code Authors: Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang | Published: 2024-08-16 Code GenerationPrompt InjectionVulnerability Management 2024.08.16 2025.05.27 Literature Database
Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments Authors: Valdemar Švábenský, Kristián Tkáčik, Aubrey Birdwell, Richard Weiss, Ryan S. Baker, Pavel Čeleda, Jan Vykopal, Jens Mache, Ankur Chattopadhyay | Published: 2024-08-16 Data CollectionStudent Performance PredictionImprovement of Learning 2024.08.16 2025.05.27 Literature Database
DePrompt: Desensitization and Evaluation of Personal Identifiable Information in Large Language Model Prompts Authors: Xiongtao Sun, Gan Liu, Zhipeng He, Hui Li, Xiaoguang Li | Published: 2024-08-16 LLM SecurityPrivacy Protection MethodPrompt Injection 2024.08.16 2025.05.27 Literature Database
A Robust Multi-Stage Intrusion Detection System for In-Vehicle Network Security using Hierarchical Federated Learning Authors: Muzun Althunayyan, Amir Javed, Omer Rana | Published: 2024-08-15 Model Performance EvaluationAutomated Intrusion Detection SystemVehicle Network Security 2024.08.15 2025.05.27 Literature Database
Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning Authors: Joon Kim, Sejin Park | Published: 2024-08-15 WatermarkingPoisoningDefense Method 2024.08.15 2025.05.27 Literature Database
Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Weiming Zhang | Published: 2024-08-15 | Updated: 2024-08-22 LLM SecurityPrompt InjectionDefense Method 2024.08.15 2025.05.27 Literature Database
KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment Authors: Zongzong Wu, Fengxiao Tang, Ming Zhao, Yufeng Li | Published: 2024-08-15 CybersecurityDataset GenerationEvaluation Method 2024.08.15 2025.05.27 Literature Database
Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques Authors: Surasit Songma, Watcharakorn Netharn, Siriluck Lorpunmanee | Published: 2024-08-14 CybersecurityData PreprocessingModel Performance Evaluation 2024.08.14 2025.05.27 Literature Database
SAGE-RT: Synthetic Alignment data Generation for Safety Evaluation and Red Teaming Authors: Anurakt Kumar, Divyanshu Kumar, Jatan Loya, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2024-08-14 WatermarkingDataset GenerationSafety Alignment 2024.08.14 2025.05.27 Literature Database