Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems Authors: Mohammed Elnawawy, Mohammadreza Hallajiyan, Gargi Mitra, Shahrear Iqbal, Karthik Pattabiraman | Published: 2024-01-30 | Updated: 2024-04-12 2024.01.30 2025.05.12 Literature Database
A Cross-Language Investigation into Jailbreak Attacks in Large Language Models Authors: Jie Li, Yi Liu, Chongyang Liu, Ling Shi, Xiaoning Ren, Yaowen Zheng, Yang Liu, Yinxing Xue | Published: 2024-01-30 2024.01.30 2025.05.12 Literature Database
Data-Oblivious ML Accelerators using Hardware Security Extensions Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan | Published: 2024-01-29 2024.01.29 2025.05.12 Literature Database
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs’ Vulnerability Reasoning Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Wei Ma, Lyuye Zhang, Yang Liu, Yingjiu Li | Published: 2024-01-29 | Updated: 2025-01-13 2024.01.29 2025.05.12 Literature Database
Federated unsupervised random forest for privacy-preserving patient stratification Authors: Bastian Pfeifer, Christel Sirocchi, Marcus D. Bloice, Markus Kreuzthaler, Martin Urschler | Published: 2024-01-29 2024.01.29 2025.05.12 Literature Database
Blockchain-enabled Trustworthy Federated Unlearning Authors: Yijing Lin, Zhipeng Gao, Hongyang Du, Jinke Ren, Zhiqiang Xie, Dusit Niyato | Published: 2024-01-29 2024.01.29 2025.05.12 Literature Database
Integrating Differential Privacy and Contextual Integrity Authors: Sebastian Benthall, Rachel Cummings | Published: 2024-01-28 2024.01.28 2025.05.12 Literature Database
L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22 2024.01.27 2025.05.12 Literature Database
Localization of Dummy Data Injection Attacks in Power Systems Considering Incomplete Topological Information: A Spatio-Temporal Graph Wavelet Convolutional Neural Network Approach Authors: Zhaoyang Qu, Yunchang Dong, Yang Li, Siqi Song, Tao Jiang, Min Li, Qiming Wang, Lei Wang, Xiaoyong Bo, Jiye Zang, Qi Xu | Published: 2024-01-27 2024.01.27 2025.05.12 Literature Database
Ransomware threat mitigation through network traffic analysis and machine learning techniques Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04 2024.01.27 2025.05.12 Literature Database