Hide and Seek: Fingerprinting Large Language Models with Evolutionary Learning Authors: Dmitri Iourovitski, Sanat Sharma, Rakshak Talwar | Published: 2024-08-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.08.06 2025.05.27 Literature Database
Pre-trained Encoder Inference: Revealing Upstream Encoders In Downstream Machine Learning Services Authors: Shaopeng Fu, Xuexue Sun, Ke Qing, Tianhang Zheng, Di Wang | Published: 2024-08-05 Privacy Protection MethodMembership InferenceAttack Method 2024.08.05 2025.05.27 Literature Database
Mitigating Malicious Attacks in Federated Learning via Confidence-aware Defense Authors: Qilei Li, Ahmed M. Abdelmoniem | Published: 2024-08-05 | Updated: 2024-08-16 DoS MitigationPoisoningDefense Method 2024.08.05 2025.05.27 Literature Database
Can Reinforcement Learning Unlock the Hidden Dangers in Aligned Large Language Models? Authors: Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-08-05 Prompt InjectionReinforcement LearningAdversarial Example 2024.08.05 2025.05.27 Literature Database
Practical Attacks against Black-box Code Completion Engines Authors: Slobodan Jenko, Jingxuan He, Niels Mündler, Mark Vero, Martin Vechev | Published: 2024-08-05 Attack MethodVulnerability ManagementEvaluation Method 2024.08.05 2025.05.27 Literature Database
Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in Customized Large Language Models Authors: Zi Liang, Haibo Hu, Qingqing Ye, Yaxin Xiao, Haoyang Li | Published: 2024-08-05 | Updated: 2025-02-12 Prompt InjectionPrompt leakingModel Evaluation 2024.08.05 2025.05.27 Literature Database
From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection Authors: Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén, Karim Khalil | Published: 2024-08-05 LLM Performance EvaluationModel Performance EvaluationVulnerability Management 2024.08.05 2025.05.27 Literature Database
Quantum Clustering for Cybersecurity Authors: Walid El Maouaki, Nouhaila Innan, Alberto Marchisio, Taoufik Said, Mohamed Bennai, Muhammad Shafique | Published: 2024-08-05 AlgorithmCybersecurityQuantum Framework 2024.08.05 2025.05.27 Literature Database
A Lean Transformer Model for Dynamic Malware Analysis and Detection Authors: Tony Quertier, Benjamin Marais, Grégoire Barrué, Stéphane Morucci, Sévan Azé, Sébastien Salladin | Published: 2024-08-05 Malware ClassificationDynamic Analysis 2024.08.05 2025.05.27 Literature Database
On the Robustness of Malware Detectors to Adversarial Samples Authors: Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kaafar | Published: 2024-08-05 WatermarkingMalware ClassificationAdversarial Example 2024.08.05 2025.05.27 Literature Database