LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04 HallucinationVulnerability of Adversarial ExamplesAdversarial Learning 2023.10.02 2025.05.28 Literature Database
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16 Security AnalysisPrompt InjectionVulnerability Prediction 2023.10.02 2025.05.28 Literature Database
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis Authors: Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin | Published: 2023-10-02 DoS MitigationStacking ModelModel Performance Evaluation 2023.10.02 2025.05.28 Literature Database
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02 WatermarkingSecurity AnalysisThreat modeling 2023.10.02 2025.05.28 Literature Database
Learning Type Inference for Enhanced Dataflow Analysis Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi | Published: 2023-10-01 | Updated: 2023-10-04 WatermarkingDynamic AnalysisEvaluation Method 2023.10.01 2025.05.28 Literature Database
Performance evaluation of Machine learning algorithms for Intrusion Detection System Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01 AlgorithmClassification Pattern AnalysisEvaluation Method 2023.10.01 2025.05.28 Literature Database
Towards LLM-based Fact Verification on News Claims with a Hierarchical Step-by-Step Prompting Method Authors: Xuan Zhang, Wei Gao | Published: 2023-09-30 Few-Shot LearningData Generation MethodDetection of Misinformation 2023.09.30 2025.05.28 Literature Database
The Lipschitz-Variance-Margin Tradeoff for Enhanced Randomized Smoothing Authors: Blaise Delattre, Alexandre Araujo, Quentin Barthélemy, Alexandre Allauzen | Published: 2023-09-28 | Updated: 2024-03-18 WatermarkingTrade-off AnalysisStability of Predictions 2023.09.28 2025.05.28 Literature Database
A Primer on Bayesian Neural Networks: Review and Debates Authors: Julyan Arbel, Konstantinos Pitas, Mariia Vladimirova, Vincent Fortuin | Published: 2023-09-28 AlgorithmSampling MethodModel Selection 2023.09.28 2025.05.28 Literature Database
Breaking On-Chip Communication Anonymity using Flow Correlation Attacks Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2025-05-06 Performance EvaluationTraffic Correlation AttackDefense Method 2023.09.27 2025.05.28 Literature Database