Exploring LLMs for Malware Detection: Review, Framework Design, and Countermeasure Approaches Authors: Jamal Al-Karaki, Muhammad Al-Zafar Khan, Marwan Omar | Published: 2024-09-11 LLM SecurityPrompt InjectionMalware Classification 2024.09.11 2025.05.12 Literature Database
SoK: Security and Privacy Risks of Medical AI Authors: Yuanhaur Chang, Han Liu, Evin Jaff, Chenyang Lu, Ning Zhang | Published: 2024-09-11 Backdoor AttackPrivacy ProtectionThreats of Medical AI 2024.09.11 2025.05.12 Literature Database
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification Authors: Zeqing Qin, Yiwei Wu, Lansheng Han | Published: 2024-09-11 LLM Performance EvaluationProgram AnalysisPrompt Injection 2024.09.11 2025.05.12 Literature Database
Revisiting Static Feature-Based Android Malware Detection Authors: Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi | Published: 2024-09-11 Dataset GenerationPoisoningModel Performance Evaluation 2024.09.11 2025.05.12 Literature Database
DrLLM: Prompt-Enhanced Distributed Denial-of-Service Resistance Method with Large Language Models Authors: Zhenyu Yin, Shang Liu, Guangyuan Xu | Published: 2024-09-11 | Updated: 2025-01-13 DDoS Attack DetectionLLM Performance EvaluationPrompt Injection 2024.09.11 2025.05.12 Literature Database
Exploring User-level Gradient Inversion with a Diffusion Prior Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang | Published: 2024-09-11 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.09.11 2025.05.12 Literature Database
Semantic Interoperability on Blockchain by Generating Smart Contracts Based on Knowledge Graphs Authors: William Van Woensel, Oshani Seneviratne | Published: 2024-09-11 Code GenerationSmart Contract 2024.09.11 2025.05.12 Literature Database
Context-Aware Membership Inference Attacks against Pre-trained Large Language Models Authors: Hongyan Chang, Ali Shahin Shamsabadi, Kleomenis Katevas, Hamed Haddadi, Reza Shokri | Published: 2024-09-11 LLM SecurityMembership InferenceAttack Method 2024.09.11 2025.05.12 Literature Database
AdaPPA: Adaptive Position Pre-Fill Jailbreak Attack Approach Targeting LLMs Authors: Lijia Lv, Weigang Zhang, Xuehai Tang, Jie Wen, Feng Liu, Jizhong Han, Songlin Hu | Published: 2024-09-11 LLM SecurityPrompt InjectionAttack Method 2024.09.11 2025.05.12 Literature Database
LLM-Enhanced Software Patch Localization Authors: Jinhong Yu, Yi Chen, Di Tang, Xiaozhong Liu, XiaoFeng Wang, Chen Wu, Haixu Tang | Published: 2024-09-10 | Updated: 2024-09-13 LLM Performance EvaluationUnderstanding Commit ContentEvaluation Method 2024.09.10 2025.05.12 Literature Database