Literature Database

Practical Secure Inference Algorithm for Fine-tuned Large Language Model Based on Fully Homomorphic Encryption

Authors: Zhang Ruoyan, Zheng Zhongxiang, Bao Wankang | Published: 2025-01-03 | Updated: 2025-01-07
Algorithm
Privacy Protection

BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction

Authors: Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane | Published: 2025-01-03
Cybersecurity
Network Threat Detection
Framework

CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models

Authors: Johan Wahréus, Ahmed Mohamed Hussain, Panos Papadimitratos | Published: 2025-01-02
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Safeguarding Large Language Models in Real-time with Tunable Safety-Performance Trade-offs

Authors: Joao Fonseca, Andrew Bell, Julia Stoyanovich | Published: 2025-01-02
Framework
Prompt Injection
Safety Alignment

NET-SA: An Efficient Secure Aggregation Architecture Based on In-Network Computing

Authors: Qingqing Ren, Wen Wang, Shuyong Zhu, Zhiyuan Wu, Yujun Zhang | Published: 2025-01-02
Secure Communication Channel
Privacy Protection
Communication Efficiency

MalCL: Leveraging GAN-Based Generative Replay to Combat Catastrophic Forgetting in Malware Classification

Authors: Jimin Park, AHyun Ji, Minji Park, Mohammad Saidur Rahman, Se Eun Oh | Published: 2025-01-02
Online Learning
Malware Classification

HoneypotNet: Backdoor Attacks Against Model Extraction

Authors: Yixu Wang, Tianle Gu, Yan Teng, Yingchun Wang, Xingjun Ma | Published: 2025-01-02
Backdoor Attack
Model Extraction Attack

A Sysmon Incremental Learning System for Ransomware Analysis and Detection

Authors: Jamil Ispahany, MD Rafiqul Islam, M. Arif Khan, MD Zahidul Islam | Published: 2025-01-02
Online Learning
Dynamic Analysis

Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs

Authors: Linhao Huang, Xue Jiang, Zhiqiang Wang, Wentao Mo, Xi Xiao, Bo Han, Yongjie Yin, Feng Zheng | Published: 2025-01-02 | Updated: 2025-01-10
Attack Evaluation
Attack Method
Adversarial Example

SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering

Authors: Shihab Ahmed, A B M Mohaimenur Rahman, Md Morshed Alam, Md Sajidul Islam Sajid | Published: 2025-01-01
Cybersecurity
Prompt Injection
Prompt Engineering