Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks Authors: Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash | Published: 2023-07-30 CybersecurityAdversarial Spectrum Attack DetectionWatermark Robustness 2023.07.30 2025.05.28 Literature Database
On Neural Network approximation of ideal adversarial attack and convergence of adversarial training Authors: Rajdeep Haldar, Qifan Song | Published: 2023-07-30 Convergence PropertyAdversarial attackOptimization Methods 2023.07.30 2025.05.28 Literature Database
Adversarial training for tabular data with attack propagation Authors: Tiago Leon Melo, João Bravo, Marco O. P. Sampaio, Paolo Romano, Hugo Ferreira, João Tiago Ascensão, Pedro Bizarro | Published: 2023-07-28 Adversarial ExampleAdversarial Spectrum Attack DetectionTime-Related Features 2023.07.28 2025.05.28 Literature Database
Robust Distortion-free Watermarks for Language Models Authors: Rohith Kuditipudi, John Thickstun, Tatsunori Hashimoto, Percy Liang | Published: 2023-07-28 | Updated: 2024-06-06 Text Perturbation MethodDigital Watermarking for Generative AIStatistical Hypothesis Testing 2023.07.28 2025.05.28 Literature Database
Universal and Transferable Adversarial Attacks on Aligned Language Models Authors: Andy Zou, Zifan Wang, Nicholas Carlini, Milad Nasr, J. Zico Kolter, Matt Fredrikson | Published: 2023-07-27 | Updated: 2023-12-20 LLM SecurityPrompt InjectionInappropriate Content Generation 2023.07.27 2025.05.28 Literature Database
Backdoor Attacks for In-Context Learning with Language Models Authors: Nikhil Kandpal, Matthew Jagielski, Florian Tramèr, Nicholas Carlini | Published: 2023-07-27 LLM SecurityBackdoor AttackPrompt Injection 2023.07.27 2025.05.28 Literature Database
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance Authors: Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge | Published: 2023-07-27 File Analysis MethodFeature Selection MethodMalware Detection with Limited Samples 2023.07.27 2025.05.28 Literature Database
Unveiling Security, Privacy, and Ethical Concerns of ChatGPT Authors: Xiaodong Wu, Ran Duan, Jianbing Ni | Published: 2023-07-26 LLM SecurityPrompt InjectionInappropriate Content Generation 2023.07.26 2025.05.28 Literature Database
Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things Authors: Deepti Gupta, Shafika Showkat Moni, Ali Saman Tosun | Published: 2023-07-25 Anomaly Detection MethodVehicle NetworkFederated Learning 2023.07.25 2025.05.28 Literature Database
The GANfather: Controllable generation of malicious activity to improve defence systems Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25 CybersecurityData GenerationClassification of Malicious Actors 2023.07.25 2025.05.28 Literature Database