ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model Authors: Dawei Wang, Geng Zhou, Li Chen, Dan Li, Yukai Miao | Published: 2024-09-02 Option-Based FuzzingPrompt InjectionVulnerability Management 2024.09.02 2025.05.27 Literature Database
NoPhish: Efficient Chrome Extension for Phishing Detection Using Machine Learning Techniques Authors: Leand Thaqi, Arbnor Halili, Kamer Vishi, Blerim Rexha | Published: 2024-09-01 Client-Side ComponentPhishing DetectionMachine Learning Method 2024.09.01 2025.05.27 Literature Database
A Novel Self-Attention-Enabled Weighted Ensemble-Based Convolutional Neural Network Framework for Distributed Denial of Service Attack Classification Authors: Kanthimathi S, Shravan Venkatraman, Jayasankar K S, Pranay Jiljith T, Jashwanth R | Published: 2024-09-01 | Updated: 2024-10-12 DDoS Attack DetectionModel Performance EvaluationMachine Learning Method 2024.09.01 2025.05.27 Literature Database
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01 Data CollectionFingerprinting MethodPrivacy Protection 2024.09.01 2025.05.27 Literature Database
The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs Authors: Bocheng Chen, Hanqing Guo, Guangjing Wang, Yuanda Wang, Qiben Yan | Published: 2024-09-01 LLM Performance EvaluationPrompt InjectionPoisoning 2024.09.01 2025.05.27 Literature Database
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01 PoisoningAdversarial ExampleEvaluation Method 2024.09.01 2025.05.27 Literature Database
Automatic Pseudo-Harmful Prompt Generation for Evaluating False Refusals in Large Language Models Authors: Bang An, Sicheng Zhu, Ruiyi Zhang, Michael-Andrei Panaitescu-Liess, Yuancheng Xu, Furong Huang | Published: 2024-09-01 LLM Performance EvaluationContent ModerationPrompt Injection 2024.09.01 2025.05.27 Literature Database
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Elias Bou-Harb, Peyman Najafirad | Published: 2024-09-01 LLM SecurityVulnerability ManagementAutomated Vulnerability Remediation 2024.09.01 2025.05.27 Literature Database
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks Authors: Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao | Published: 2024-08-31 | Updated: 2024-09-04 Membership InferenceAttack MethodDifficulty Calibration 2024.08.31 2025.05.27 Literature Database
Ethical Challenges in Computer Vision: Ensuring Privacy and Mitigating Bias in Publicly Available Datasets Authors: Ghalib Ahmed Tahir | Published: 2024-08-31 | Updated: 2025-08-11 Data CollectionCompliance with Ethical GuidelinesEnsuring Fairness 2024.08.31 2025.08.13 Literature Database