Literature Database

A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models

Authors: Beatrice Casey, Joanna C. S. Santos, Mehdi Mirakhorli | Published: 2024-10-06
Cybersecurity
Backdoor Attack

Enhancing Android Malware Detection: The Influence of ChatGPT on Decision-centric Task

Authors: Yao Li, Sen Fang, Tao Zhang, Haipeng Cai | Published: 2024-10-06
Prompt Injection
Malware Classification

OD-Stega: LLM-Based Near-Imperceptible Steganography via Optimized Distributions

Authors: Yu-Shin Huang, Peter Just, Krishna Narayanan, Chao Tian | Published: 2024-10-06
Text Generation Method
Optimization Problem

Taylor Unswift: Secured Weight Release for Large Language Models via Taylor Expansion

Authors: Guanchu Wang, Yu-Neng Chuang, Ruixiang Tang, Shaochen Zhong, Jiayi Yuan, Hongye Jin, Zirui Liu, Vipin Chaudhary, Shuai Xu, James Caverlee, Xia Hu | Published: 2024-10-06
LLM Security
Cryptography

Harnessing Task Overload for Scalable Jailbreak Attacks on Large Language Models

Authors: Yiting Dong, Guobin Shen, Dongcheng Zhao, Xiang He, Yi Zeng | Published: 2024-10-05
LLM Security
Prompt Injection
Attack Method

DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech

Authors: Dominika Woszczyk, Soteris Demetriou | Published: 2024-10-05
LLM Performance Evaluation
Privacy Protection

pFedGame — Decentralized Federated Learning using Game Theory in Dynamic Topology

Authors: Monik Raj Behera, Suchetana Chakraborty | Published: 2024-10-05
Simulation Result Evaluation
Privacy Protection

BlockScan: Detecting Anomalies in Blockchain Transactions

Authors: Jiahao Yu, Xian Wu, Hao Liu, Wenbo Guo, Xinyu Xing | Published: 2024-10-05 | Updated: 2025-10-21
Backdoor Detection
Blockchain Technology
異常検知

ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs

Authors: Lu Yan, Siyuan Cheng, Xuan Chen, Kaiyuan Zhang, Guangyu Shen, Zhuo Zhang, Xiangyu Zhang | Published: 2024-10-05
Negative Training
Backdoor Attack
Prompt Injection

An Intelligent Native Network Slicing Security Architecture Empowered by Federated Learning

Authors: Rodrigo Moreira, Rodolfo S. Villaca, Moises R. N. Ribeiro, Joberto S. B. Martins, Joao Henrique Correa, Tereza C. Carvalho, Flavio de Oliveira Silva | Published: 2024-10-04
Network Slicing
Experimental Validation