Automatic Pseudo-Harmful Prompt Generation for Evaluating False Refusals in Large Language Models Authors: Bang An, Sicheng Zhu, Ruiyi Zhang, Michael-Andrei Panaitescu-Liess, Yuancheng Xu, Furong Huang | Published: 2024-09-01 LLM Performance EvaluationContent ModerationPrompt Injection 2024.09.01 2025.05.12 Literature Database
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Elias Bou-Harb, Peyman Najafirad | Published: 2024-09-01 LLM SecurityVulnerability ManagementAutomated Vulnerability Remediation 2024.09.01 2025.05.12 Literature Database
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks Authors: Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao | Published: 2024-08-31 | Updated: 2024-09-04 Membership InferenceAttack MethodDifficulty Calibration 2024.08.31 2025.05.12 Literature Database
AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN) Authors: Lorenzo Guerra, Linhan Xu, Paolo Bellavista, Thomas Chapuis, Guillaume Duc, Pavlo Mozharovskyi, Van-Tam Nguyen | Published: 2024-08-30 | Updated: 2024-09-05 Attack MethodAutomated Intrusion Detection SystemVehicle Network Security 2024.08.30 2025.05.12 Literature Database
Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection Authors: Sachin Shukla, Omid Mirzaei | Published: 2024-08-29 | Updated: 2024-09-04 WatermarkingSpam DetectionVisual Similarity Detection 2024.08.29 2025.05.12 Literature Database
Analyzing Inference Privacy Risks Through Gradients in Machine Learning Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley Malin, Ye Wang | Published: 2024-08-29 Privacy Protection MethodPoisoningMembership Inference 2024.08.29 2025.05.12 Literature Database
LLM Defenses Are Not Robust to Multi-Turn Human Jailbreaks Yet Authors: Nathaniel Li, Ziwen Han, Ian Steneker, Willow Primack, Riley Goodside, Hugh Zhang, Zifan Wang, Cristina Menghini, Summer Yue | Published: 2024-08-27 | Updated: 2024-09-04 Prompt InjectionUser EducationAttack Method 2024.08.27 2025.05.12 Literature Database
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23 Security AnalysisVulnerability ManagementEvaluation Method 2024.08.23 2025.05.12 Literature Database
Obfuscated Memory Malware Detection Authors: Sharmila S P, Aruna Tiwari, Narendra S Chaudhari | Published: 2024-08-23 CybersecurityMalware ClassificationModel Performance Evaluation 2024.08.23 2025.05.12 Literature Database
Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks Authors: Yusuf Usman, Aadesh Upadhyay, Prashnna Gyawali, Robin Chataut | Published: 2024-08-23 CybersecurityPrompt InjectionAttack Method 2024.08.23 2025.05.12 Literature Database