A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner | Published: 2023-10-06 | Updated: 2023-12-04 Data Protection MethodPrivacy Protection MethodPoisoning 2023.10.06 2025.05.28 Literature Database
Risk factor aggregation and stress testing Authors: Natalie Packham | Published: 2023-10-06 Clustering methodsData CollectionMachine Learning Method 2023.10.06 2025.05.28 Literature Database
Assessing Robustness via Score-Based Adversarial Image Generation Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06 Data GenerationExperimental ValidationDefense Method 2023.10.06 2025.05.28 Literature Database
Threat Trekker: An Approach to Cyber Threat Hunting Authors: Ángel Casanova Bienzobas, Alfonso Sánchez-Macián | Published: 2023-10-06 Class ImbalanceData CollectionMachine Learning Method 2023.10.06 2025.05.28 Literature Database
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To! Authors: Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson | Published: 2023-10-05 Data CollectionPrompt InjectionInformation Gathering Methods 2023.10.05 2025.05.28 Literature Database
SmoothLLM: Defending Large Language Models Against Jailbreaking Attacks Authors: Alexander Robey, Eric Wong, Hamed Hassani, George J. Pappas | Published: 2023-10-05 | Updated: 2024-06-11 LLM Performance EvaluationPrompt InjectionDefense Method 2023.10.05 2025.05.28 Literature Database
The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign Authors: Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis | Published: 2023-10-05 Data CollectionUser Activity AnalysisVictim Statistics 2023.10.05 2025.05.28 Literature Database
Misusing Tools in Large Language Models With Visual Adversarial Examples Authors: Xiaohan Fu, Zihan Wang, Shuheng Li, Rajesh K. Gupta, Niloofar Mireshghallah, Taylor Berg-Kirkpatrick, Earlence Fernandes | Published: 2023-10-04 LLM Performance EvaluationPrompt InjectionAdversarial Example 2023.10.04 2025.05.28 Literature Database
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors Authors: Biagio Montaruli, Luca Demetrio, Maura Pintor, Luca Compagna, Davide Balzarotti, Battista Biggio | Published: 2023-10-04 | Updated: 2023-10-14 PhishingPoisoningMachine Learning Method 2023.10.04 2025.05.28 Literature Database
Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset Authors: Tharindu Lakshan Yasarathna, Lojenaa Navanesan, Simon Barque, Assanka Sayakkara, Nhien-An Le-Khac | Published: 2023-10-04 WatermarkingCross-Device AnalysisClassification Pattern Analysis 2023.10.04 2025.05.28 Literature Database