Literature Database

SAGE-RT: Synthetic Alignment data Generation for Safety Evaluation and Red Teaming

Authors: Anurakt Kumar, Divyanshu Kumar, Jatan Loya, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2024-08-14
Watermarking
Dataset Generation
Safety Alignment

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions

Authors: Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun | Published: 2024-08-14
Code Change Analysis
Prompt Injection
Vulnerability Management

FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method

Authors: Shihua Sun, Pragya Sharma, Kenechukwu Nwodo, Angelos Stavrou, Haining Wang | Published: 2024-08-13
Client Clustering
Poisoning
Optimization Problem

Casper: Prompt Sanitization for Protecting User Privacy in Web-Based Large Language Models

Authors: Chun Jie Chong, Chenxi Hou, Zhihao Yao, Seyed Mohammadjavad Seyed Talebi | Published: 2024-08-13
LLM Security
Privacy Protection
Prompt Injection

Fooling SHAP with Output Shuffling Attacks

Authors: Jun Yuan, Aritra Dasgupta | Published: 2024-08-12
AI Compliance
Watermarking
Bias

Privacy in Federated Learning

Authors: Jaydip Sen, Hetvi Waghela, Sneha Rakshit | Published: 2024-08-12
Privacy Protection
Privacy Protection Method
Model Performance Evaluation

Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study

Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12
LLM Performance Evaluation
Prompt Injection
Vulnerability Management

A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution

Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12
LLM Performance Evaluation
RAG
Cybersecurity

Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption

Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12
Integration of FL and HE
Watermarking
Privacy Protection Method

Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection

Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12
Prompt Injection
Model Performance Evaluation
Log Analysis Method