A Lean Transformer Model for Dynamic Malware Analysis and Detection Authors: Tony Quertier, Benjamin Marais, Grégoire Barrué, Stéphane Morucci, Sévan Azé, Sébastien Salladin | Published: 2024-08-05 Malware ClassificationDynamic Analysis 2024.08.05 2025.05.27 Literature Database
On the Robustness of Malware Detectors to Adversarial Samples Authors: Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kaafar | Published: 2024-08-05 WatermarkingMalware ClassificationAdversarial Example 2024.08.05 2025.05.27 Literature Database
Model Hijacking Attack in Federated Learning Authors: Zheng Li, Siyuan Wu, Ruichuan Chen, Paarijaat Aditya, Istemi Ekin Akkus, Manohar Vanga, Min Zhang, Hao Li, Yang Zhang | Published: 2024-08-04 WatermarkingClass Mapping MethodPoisoning 2024.08.04 2025.05.27 Literature Database
PromptSAM+: Malware Detection based on Prompt Segment Anything Model Authors: Xingyuan Wei, Yichen Liu, Ce Li, Ning Li, Degang Sun, Yan Wang | Published: 2024-08-04 WatermarkingMalware ClassificationModel Performance Evaluation 2024.08.04 2025.05.27 Literature Database
Towards Automatic Hands-on-Keyboard Attack Detection Using LLMs in EDR Solutions Authors: Amit Portnoy, Ehud Azikri, Shay Kels | Published: 2024-08-04 LLM SecurityEndpoint DetectionData Collection 2024.08.04 2025.05.27 Literature Database
Automated Phishing Detection Using URLs and Webpages Authors: Huilin Wang, Bryan Hooi | Published: 2024-08-03 | Updated: 2024-08-16 Phishing DetectionBrand Recognition ProblemPrompt Injection 2024.08.03 2025.05.27 Literature Database
MCGMark: An Encodable and Robust Online Watermark for Tracing LLM-Generated Malicious Code Authors: Kaiwen Ning, Jiachi Chen, Qingyuan Zhong, Tao Zhang, Yanlin Wang, Wei Li, Jingwen Zhang, Jianxing Yu, Yuming Feng, Weizhe Zhang, Zibin Zheng | Published: 2024-08-02 | Updated: 2025-04-21 Code GenerationPrompt InjectionWatermark Robustness 2024.08.02 2025.05.27 Literature Database
A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks Authors: Charles Oredola, Adnan Ashraf | Published: 2024-08-02 SDN ArchitectureCybersecurityEvaluation Method 2024.08.02 2025.05.27 Literature Database
Assessing Robustness of Machine Learning Models using Covariate Perturbations Authors: Arun Prakash R, Anwesha Bhattacharyya, Joel Vaughan, Vijayan N. Nair | Published: 2024-08-02 Perturbation Method for Categorical VariablesModel Performance EvaluationStability of Predictions 2024.08.02 2025.05.27 Literature Database
LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems Authors: Zhensu Sun, Haotian Zhu, Bowen Xu, Xiaoning Du, Li Li, David Lo | Published: 2024-08-02 LLM Performance EvaluationProgram AnalysisSelf-Healing System 2024.08.02 2025.05.27 Literature Database