Literature Database

Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks

Authors: Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-04-03
Watermarking
Physical layer security
Watermark Evaluation

Exploring Backdoor Vulnerabilities of Chat Models

Authors: Yunzhuo Hao, Wenkai Yang, Yankai Lin | Published: 2024-04-03
Backdoor Attack
Prompt Injection

Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis

Authors: S M Rakib Hasan, Aakar Dhakal | Published: 2024-04-03
Cybersecurity
Prompt Injection
Malware Classification

Generative AI-Based Effective Malware Detection for Embedded Computing Systems

Authors: Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-02 | Updated: 2024-04-12
Dataset Generation
Malware Classification
Malware Detection with Limited Samples

Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks

Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion | Published: 2024-04-02 | Updated: 2024-10-07
LLM Security
Prompt Injection
Attack Method

Digital Forgetting in Large Language Models: A Survey of Unlearning Methods

Authors: Alberto Blanco-Justicia, Najeeb Jebreel, Benet Manzanares, David Sánchez, Josep Domingo-Ferrer, Guillem Collell, Kuan Eeik Tan | Published: 2024-04-02
LLM Performance Evaluation
Prompt Injection
Machine Unlearning

Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial Attack

Authors: Ying Zhou, Ben He, Le Sun | Published: 2024-04-02
LLM Security
Watermarking
Attack Method

AAA: an Adaptive Mechanism for Locally Differential Private Mean Estimation

Authors: Fei Wei, Ergute Bao, Xiaokui Xiao, Yin Yang, Bolin Ding | Published: 2024-04-02 | Updated: 2024-04-03
Watermarking
Privacy Protection Method
Optimization Problem

Can Biases in ImageNet Models Explain Generalization?

Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01
Bias
Model Performance Evaluation
Watermark Evaluation

Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models

Authors: Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Geiping, Tom Goldstein, Nicholas Carlini | Published: 2024-04-01
Backdoor Attack
Poisoning
Membership Inference