Literature Database

Towards Explainable Network Intrusion Detection using Large Language Models

Authors: Paul R. B. Houssel, Priyanka Singh, Siamak Layeghy, Marius Portmann | Published: 2024-08-08
LLM Performance Evaluation
Network Threat Detection
Prompt Injection

AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent

Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair | Published: 2024-08-08
Edge Computing
Cybersecurity
Automated Intrusion Detection System

Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding

Authors: Jonggyu Jang, Hyeonsu Lyu, Seongjin Hwang, Hyun Jong Yang | Published: 2024-08-08
Watermarking
Watermark Evaluation
Face Recognition System

Zero-day attack and ransomware detection

Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08
Cybersecurity
Ransomware Assessment
Machine Learning Method

LaFA: Latent Feature Attacks on Non-negative Matrix Factorization

Authors: Minh Vu, Ben Nebgen, Erik Skau, Geigh Zollicoffer, Juan Castorena, Kim Rasmussen, Boian Alexandrov, Manish Bhattarai | Published: 2024-08-07
Watermarking
Attack Method
Adversarial Example

EnJa: Ensemble Jailbreak on Large Language Models

Authors: Jiahao Zhang, Zilong Wang, Ruofan Wang, Xingjun Ma, Yu-Gang Jiang | Published: 2024-08-07
Prompt Injection
Attack Method
Evaluation Method

MPC-Minimized Secure LLM Inference

Authors: Deevashwer Rathee, Dacheng Li, Ion Stoica, Hao Zhang, Raluca Popa | Published: 2024-08-07
LLM Performance Evaluation
MPC Algorithm
Model Performance Evaluation

Harnessing the Power of LLMs in Source Code Vulnerability Detection

Authors: Andrew A Mahyari | Published: 2024-08-07
LLM Performance Evaluation
Program Analysis
Vulnerability Management

Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis

Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06
Phishing Detection
Model Performance Evaluation
Defense Method

Malicious Internet Entity Detection Using Local Graph Inference

Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07
Algorithm
Graph Transformation
Evaluation Method