Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++ Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03 2024.07.24 2025.05.27 Literature Database
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models Authors: Lingzhi Wang, Zhenyuan Li, Yi Jiang, Zhengkai Wang, Zonghan Guo, Jiahui Wang, Yangyang Wei, Xiangmin Shen, Wei Ruan, Yan Chen | Published: 2024-07-24 | Updated: 2025-04-17 2024.07.24 2025.05.27 Literature Database
Theoretical Analysis of Privacy Leakage in Trustworthy Federated Learning: A Perspective from Linear Algebra and Optimization Theory Authors: Xiaojin Zhang, Wei Chen | Published: 2024-07-23 2024.07.23 2025.05.27 Literature Database
Private prediction for large-scale synthetic text generation Authors: Kareem Amin, Alex Bie, Weiwei Kong, Alexey Kurakin, Natalia Ponomareva, Umar Syed, Andreas Terzis, Sergei Vassilvitskii | Published: 2024-07-16 | Updated: 2024-10-09 2024.07.16 2025.05.27 Literature Database
Variational Randomized Smoothing for Sample-Wise Adversarial Robustness Authors: Ryo Hase, Ye Wang, Toshiaki Koike-Akino, Jing Liu, Kieran Parsons | Published: 2024-07-16 2024.07.16 2025.05.27 Literature Database
Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis Authors: Zhipeng He, Chun Ouyang, Laith Alzubaidi, Alistair Barros, Catarina Moreira | Published: 2024-07-16 | Updated: 2024-10-04 2024.07.16 2025.05.27 Literature Database
Hey, That’s My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique Authors: Mark Russinovich, Ahmed Salem | Published: 2024-07-15 | Updated: 2025-06-12 2024.07.15 2025.06.14 Literature Database
SLIP: Securing LLMs IP Using Weights Decomposition Authors: Yehonathan Refael, Adam Hakim, Lev Greenberg, Tal Aviv, Satya Lokam, Ben Fishman, Shachar Seidman | Published: 2024-07-15 | Updated: 2024-08-01 2024.07.15 2025.05.27 Literature Database
Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks Authors: Lukas Gosch, Mahalakshmi Sabanayagam, Debarghya Ghoshdastidar, Stephan Günnemann | Published: 2024-07-15 | Updated: 2024-10-14 2024.07.15 2025.05.27 Literature Database
Systematic Categorization, Construction and Evaluation of New Attacks against Multi-modal Mobile GUI Agents Authors: Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang | Published: 2024-07-12 | Updated: 2025-03-16 2024.07.12 2025.05.27 Literature Database