Literature Database

Malicious URL Detection using optimized Hist Gradient Boosting Classifier based on grid search method

Authors: Mohammad Maftoun, Nima Shadkam, Seyedeh Somayeh Salehi Komamardakhi, Zulkefli Mansor, Javad Hassannataj Joloudari | Published: 2024-06-12
Model Performance Evaluation
Malicious Website Detection
Machine Learning Method

Efficient Network Traffic Feature Sets for IoT Intrusion Detection

Authors: Miguel Silva, João Vitorino, Eva Maia, Isabel Praça | Published: 2024-06-12
Prompt Injection
Model Performance Evaluation
Machine Learning Method

Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition

Authors: Edoardo Debenedetti, Javier Rando, Daniel Paleka, Silaghi Fineas Florin, Dragos Albastroiu, Niv Cohen, Yuval Lemberg, Reshmi Ghosh, Rui Wen, Ahmed Salem, Giovanni Cherubin, Santiago Zanella-Beguelin, Robin Schmid, Victor Klemm, Takahiro Miki, Chenhao Li, Stefan Kraft, Mario Fritz, Florian Tramèr, Sahar Abdelnabi, Lea Schönherr | Published: 2024-06-12
LLM Security
Prompt Injection
Defense Method

A Study of Backdoors in Instruction Fine-tuned Language Models

Authors: Jayaram Raghuram, George Kesidis, David J. Miller | Published: 2024-06-12 | Updated: 2024-08-21
LLM Security
Backdoor Attack
Defense Method

Knowledge Return Oriented Prompting (KROP)

Authors: Jason Martin, Kenneth Yeung | Published: 2024-06-11
LLM Security
Prompt Injection
Attack Method

LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing

Authors: Hongxiang Zhang, Yuyang Rong, Yifeng He, Hao Chen | Published: 2024-06-11 | Updated: 2024-06-13
LLM Performance Evaluation
Fuzzing
Prompt Injection

Adversarial Machine Unlearning

Authors: Zonglin Di, Sixie Yu, Yevgeniy Vorobeychik, Yang Liu | Published: 2024-06-11
Membership Inference
Optimization Problem

Beyond Words: On Large Language Models Actionability in Mission-Critical Risk Analysis

Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi | Published: 2024-06-11 | Updated: 2024-09-06
LLM Performance Evaluation
RAG
Risk Management

Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation

Authors: Zhaoyi Lu, Wenchao Xu, Ming Tu, Xin Xie, Cunqing Hua, Nan Cheng | Published: 2024-06-11 | Updated: 2024-06-12
Watermarking
Fingerprinting Method
Signal Perturbation Method

VulDetectBench: Evaluating the Deep Capability of Vulnerability Detection with Large Language Models

Authors: Yu Liu, Lang Gao, Mingxin Yang, Yu Xie, Ping Chen, Xiaojin Zhang, Wei Chen | Published: 2024-06-11 | Updated: 2024-08-21
LLM Performance Evaluation
Model Performance Evaluation
Vulnerability Management