Literature Database

Robust Q-Learning under Corrupted Rewards

Authors: Sreejeet Maity, Aritra Mitra | Published: 2024-09-05
Algorithm
Convergence Guarantee
Reinforcement Learning

Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection

Authors: Li Yang, Abdallah Shami | Published: 2024-09-05
Framework
Model Performance Evaluation
Automated Intrusion Detection System

Well, that escalated quickly: The Single-Turn Crescendo Attack (STCA)

Authors: Alan Aqrawi, Arian Abbasi | Published: 2024-09-04 | Updated: 2024-09-10
LLM Security
Content Moderation
Attack Method

Obsidian: Cooperative State-Space Exploration for Performant Inference on Secure ML Accelerators

Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2024-09-04
Energy Management
Memory Management Method
Optimization Problem

Boosting Certified Robustness for Time Series Classification with Efficient Self-Ensemble

Authors: Chang Dong, Zhengyang Li, Liangwei Zheng, Weitong Chen, Wei Emma Zhang | Published: 2024-09-04 | Updated: 2024-09-19
Adversarial Example
Evaluation Method
Watermark Evaluation

“Yes, My LoRD.” Guiding Language Model Extraction with Locality Reinforced Distillation

Authors: Zi Liang, Qingqing Ye, Yanyun Wang, Sen Zhang, Yaxin Xiao, Ronghua Li, Jianliang Xu, Haibo Hu | Published: 2024-09-04 | Updated: 2025-05-19
LLM Security
Model Extraction Attack
Watermarking Technology

AdvSecureNet: A Python Toolkit for Adversarial Machine Learning

Authors: Melih Catal, Manuel Günther | Published: 2024-09-04
Toolkit Comparison
Adversarial Training
Evaluation Method

Adversarial Attacks on Machine Learning-Aided Visualizations

Authors: Takanori Fujiwara, Kostiantyn Kucher, Junpeng Wang, Rafael M. Martins, Andreas Kerren, Anders Ynnerman | Published: 2024-09-04 | Updated: 2024-09-24
Backdoor Attack
Adversarial Example
Vulnerability of Visualization

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer

Authors: Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu | Published: 2024-09-03
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural Backdoor

Authors: Abdullah Arafat Miah, Yu Bi | Published: 2024-09-03 | Updated: 2024-09-09
Backdoor Attack
Model Performance Evaluation