Literature Database

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints

Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01
Data Collection
Fingerprinting Method
Privacy Protection

The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs

Authors: Bocheng Chen, Hanqing Guo, Guangjing Wang, Yuanda Wang, Qiben Yan | Published: 2024-09-01
LLM Performance Evaluation
Prompt Injection
Poisoning

Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers

Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01
Poisoning
Adversarial Example
Evaluation Method

Automatic Pseudo-Harmful Prompt Generation for Evaluating False Refusals in Large Language Models

Authors: Bang An, Sicheng Zhu, Ruiyi Zhang, Michael-Andrei Panaitescu-Liess, Yuancheng Xu, Furong Huang | Published: 2024-09-01
LLM Performance Evaluation
Content Moderation
Prompt Injection

Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs

Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Elias Bou-Harb, Peyman Najafirad | Published: 2024-09-01
LLM Security
Vulnerability Management
Automated Vulnerability Remediation

Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks

Authors: Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao | Published: 2024-08-31 | Updated: 2024-09-04
Membership Inference
Attack Method
Difficulty Calibration

Ethical Challenges in Computer Vision: Ensuring Privacy and Mitigating Bias in Publicly Available Datasets

Authors: Ghalib Ahmed Tahir | Published: 2024-08-31 | Updated: 2025-08-11
Data Collection
Compliance with Ethical Guidelines
Ensuring Fairness

AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN)

Authors: Lorenzo Guerra, Linhan Xu, Paolo Bellavista, Thomas Chapuis, Guillaume Duc, Pavlo Mozharovskyi, Van-Tam Nguyen | Published: 2024-08-30 | Updated: 2024-09-05
Attack Method
Automated Intrusion Detection System
Vehicle Network Security

Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection

Authors: Sachin Shukla, Omid Mirzaei | Published: 2024-08-29 | Updated: 2024-09-04
Watermarking
Spam Detection
Visual Similarity Detection

Analyzing Inference Privacy Risks Through Gradients in Machine Learning

Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley Malin, Ye Wang | Published: 2024-08-29
Privacy Protection Method
Poisoning
Membership Inference