Large Language Models are Unreliable for Cyber Threat Intelligence Authors: Emanuele Mezzi, Fabio Massacci, Katja Tuma | Published: 2025-03-29 | Updated: 2025-07-16 Few-Shot LearningPrompt leakingPerformance Evaluation Method 2025.03.29 2025.07.18 Literature Database
Intelligent IoT Attack Detection Design via ODLLM with Feature Ranking-based Knowledge Base Authors: Satvik Verma, Qun Wang, E. Wes Bethel | Published: 2025-03-27 DDoS Attack DetectionLLM SecurityNetwork Traffic Analysis 2025.03.27 2025.05.27 Literature Database
Prompt, Divide, and Conquer: Bypassing Large Language Model Safety Filters via Segmented and Distributed Prompt Processing Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-03-27 System DevelopmentPrompt InjectionLarge Language Model 2025.03.27 2025.05.27 Literature Database
Bayesian Pseudo Posterior Mechanism for Differentially Private Machine Learning Authors: Robert Chew, Matthew R. Williams, Elan A. Segarra, Alexander J. Preiss, Amanda Konet, Terrance D. Savitsky | Published: 2025-03-27 Application of Text ClassificationPrivacy IssuesRisk Assessment 2025.03.27 2025.05.27 Literature Database
Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27 RAGPoisoning attack on RAGVulnerability of Adversarial Examples 2025.03.27 2025.05.27 Literature Database
SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers Authors: Nimesha Wickramasinghe, Arash Shaghaghi, Gene Tsudik, Sanjay Jha | Published: 2025-03-25 | Updated: 2025-04-14 Dataset ApplicabilityModel Design and AccuracyOverfitting 2025.03.25 2025.05.27 Literature Database
Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent Authors: Philip Doldo, Derek Everett, Amol Khanna, Andre T Nguyen, Edward Raff | Published: 2025-03-25 Vulnerability of Adversarial ExamplesAdversarial LearningRobustness of Deep Networks 2025.03.25 2025.05.27 Literature Database
Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking Authors: Sheikh Muhammad Farjad, Sandeep Reddy Patllola, Yonas Kassa, George Grispos, Robin Gandhi | Published: 2025-03-24 Edge ComputingCloud ComputingResource Usage Analysis 2025.03.24 2025.05.27 Literature Database
Defeating Prompt Injections by Design Authors: Edoardo Debenedetti, Ilia Shumailov, Tianqi Fan, Jamie Hayes, Nicholas Carlini, Daniel Fabian, Christoph Kern, Chongyang Shi, Andreas Terzis, Florian Tramèr | Published: 2025-03-24 Indirect Prompt InjectionPrompt Injection 2025.03.24 2025.05.27 Literature Database
Leveraging VAE-Derived Latent Spaces for Enhanced Malware Detection with Machine Learning Classifiers Authors: Bamidele Ajayi, Basel Barakat, Ken McGarry | Published: 2025-03-24 | Updated: 2025-04-30 Malware ClassificationFactors of Performance DegradationMachine Learning Technology 2025.03.24 2025.05.27 Literature Database