Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM Authors: Haizhou Wang, Nanqing Luo, Xusheng Li, Peng LIu | Published: 2024-11-08 | Updated: 2025-04-29 Malware EvolutionAttack MethodAnalysis of Detection Methods 2024.11.08 2025.05.12 Literature Database
Post-Hoc Robustness Enhancement in Graph Neural Networks with Conditional Random Fields Authors: Yassine Abbahaddou, Sofiane Ennadir, Johannes F. Lutzeyer, Fragkiskos D. Malliaros, Michalis Vazirgiannis | Published: 2024-11-08 Experimental Validation 2024.11.08 2025.05.12 Literature Database
MRJ-Agent: An Effective Jailbreak Agent for Multi-Round Dialogue Authors: Fengxiang Wang, Ranjie Duan, Peng Xiao, Xiaojun Jia, Shiji Zhao, Cheng Wei, YueFeng Chen, Chongwen Wang, Jialing Tao, Hang Su, Jun Zhu, Hui Xue | Published: 2024-11-06 | Updated: 2025-01-07 Prompt InjectionMulti-Round Dialogue 2024.11.06 2025.05.12 Literature Database
Optimal Defenses Against Gradient Reconstruction Attacks Authors: Yuxiao Chen, Gamze Gürsoy, Qi Lei | Published: 2024-11-06 PoisoningDefense Method 2024.11.06 2025.05.12 Literature Database
FEDLAD: Federated Evaluation of Deep Leakage Attacks and Defenses Authors: Isaac Baglin, Xiatian Zhu, Simon Hadfield | Published: 2024-11-05 | Updated: 2025-01-05 PoisoningAttack EvaluationEvaluation Method 2024.11.05 2025.05.12 Literature Database
A General Recipe for Contractive Graph Neural Networks — Technical Report Authors: Maya Bechler-Speicher, Moshe Eliasof | Published: 2024-11-04 AlgorithmConvergence AnalysisRegularization 2024.11.04 2025.05.12 Literature Database
What Features in Prompts Jailbreak LLMs? Investigating the Mechanisms Behind Attacks Authors: Nathalie Kirch, Constantin Weisser, Severin Field, Helen Yannakoudakis, Stephen Casper | Published: 2024-11-02 | Updated: 2025-05-14 Disabling Safety Mechanisms of LLMPrompt InjectionExploratory Attack 2024.11.02 2025.05.16 Literature Database
Privacy-Preserving Federated Learning with Differentially Private Hyperdimensional Computing Authors: Fardin Jalil Piran, Zhiling Chen, Mohsen Imani, Farhad Imani | Published: 2024-11-02 | Updated: 2025-03-22 Privacy ProtectionFramework 2024.11.02 2025.05.12 Literature Database
Attention Tracker: Detecting Prompt Injection Attacks in LLMs Authors: Kuo-Han Hung, Ching-Yun Ko, Ambrish Rawat, I-Hsin Chung, Winston H. Hsu, Pin-Yu Chen | Published: 2024-11-01 | Updated: 2025-04-23 Indirect Prompt InjectionLarge Language ModelAttention Mechanism 2024.11.01 2025.05.12 Literature Database
Efficient Model Compression for Bayesian Neural Networks Authors: Diptarka Saha, Zihe Liu, Feng Liang | Published: 2024-11-01 Sparse ModelModel Performance EvaluationOptimization Problem 2024.11.01 2025.05.12 Literature Database