Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges Authors: Rami Darwish, Mahmoud Abdelsalam, Sajad Khorsandroo | Published: 2024-10-14 XIoT Malware AnalysisMalware Classification 2024.10.14 2025.05.12 Literature Database
Denial-of-Service Poisoning Attacks against Large Language Models Authors: Kuofeng Gao, Tianyu Pang, Chao Du, Yong Yang, Shu-Tao Xia, Min Lin | Published: 2024-10-14 Prompt InjectionModel DoSResource Scarcity Issues 2024.10.14 2025.05.12 Literature Database
Adversarially Robust Out-of-Distribution Detection Using Lyapunov-Stabilized Embeddings Authors: Hossein Mirzaei, Mackenzie W. Mathis | Published: 2024-10-14 | Updated: 2025-01-26 Membership InferenceAdversarial Training 2024.10.14 2025.05.12 Literature Database
Towards Calibrated Losses for Adversarial Robust Reject Option Classification Authors: Vrund Shah, Tejas Chaudhari, Naresh Manwani | Published: 2024-10-14 Adversarial Training 2024.10.14 2025.05.12 Literature Database
Regularized Robustly Reliable Learners and Instance Targeted Attacks Authors: Avrim Blum, Donya Saless | Published: 2024-10-14 | Updated: 2025-05-08 Sample ComplexityRobustness EvaluationRobust Optimization 2024.10.14 2025.05.12 Literature Database
Unified Breakdown Analysis for Byzantine Robust Gossip Authors: Renaud Gaucher, Aymeric Dieuleveut, Hadrien Hendrikx | Published: 2024-10-14 | Updated: 2025-02-03 FrameworkAttack Method 2024.10.14 2025.05.12 Literature Database
On Calibration of LLM-based Guard Models for Reliable Content Moderation Authors: Hongfu Liu, Hengguan Huang, Hao Wang, Xiangming Gu, Ye Wang | Published: 2024-10-14 LLM Performance EvaluationContent ModerationPrompt Injection 2024.10.14 2025.05.12 Literature Database
Feature Averaging: An Implicit Bias of Gradient Descent Leading to Non-Robustness in Neural Networks Authors: Binghui Li, Zhixuan Pan, Kaifeng Lyu, Jian Li | Published: 2024-10-14 Convergence AnalysisAdversarial Example 2024.10.14 2025.05.12 Literature Database
Yuan: Research on the Concept of Digital World Analogue Scientific Infrastructure and Science Popularization Communication Based on Suzhou Gardens Pattern Authors: Zhang Lvyang, Lu Wen, Zhao Yang, Li Jiaqi, Zhai Lidong | Published: 2024-10-14 Cybersecurity 2024.10.14 2025.05.12 Literature Database
Can LLMs be Scammed? A Baseline Measurement Study Authors: Udari Madhushani Sehwag, Kelly Patel, Francesca Mosca, Vineeth Ravi, Jessica Staddon | Published: 2024-10-14 LLM Performance EvaluationPrompt InjectionEvaluation Method 2024.10.14 2025.05.12 Literature Database