Literature Database

Machine Unlearning for Traditional Models and Large Language Models: A Short Survey

Authors: Yi Xu | Published: 2024-04-01
Data Privacy Assessment
Model Performance Evaluation
Machine Unlearning

Enhancing Reasoning Capacity of SLM using Cognitive Enhancement

Authors: Jonathan Pan, Swee Liang Wong, Xin Wei Chia, Yidi Yuan | Published: 2024-04-01
LLM Performance Evaluation
Model Performance Evaluation
Log Analysis Method

An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks

Authors: Abdullah H Alqahtani | Published: 2024-04-01
Online Learning
Intrusion Detection System
Anomaly Detection Method

What is in Your Safe Data? Identifying Benign Data that Breaks Safety

Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20
Data Selection Strategy
Prompt Injection
Psychological Manipulation

Can LLMs get help from other LLMs without revealing private information?

Authors: Florian Hartmann, Duc-Hieu Tran, Peter Kairouz, Victor Cărbune, Blaise Aguera y Arcas | Published: 2024-04-01 | Updated: 2024-04-02
LLM Security
Privacy Protection
Privacy Protection Method

On Large Language Models’ Hallucination with Regard to Known Facts

Authors: Che Jiang, Biqing Qi, Xiangyu Hong, Dayuan Fu, Yang Cheng, Fandong Meng, Mo Yu, Bowen Zhou, Jie Zhou | Published: 2024-03-29 | Updated: 2024-10-28
Hallucination
Detection of Hallucinations
Model Architecture

A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks

Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07
Dataset Generation
Backdoor Attack
Poisoning

Detecting Financial Bots on the Ethereum Blockchain

Authors: Thomas Niedermayer, Pietro Saggese, Bernhard Haslhofer | Published: 2024-03-28 | Updated: 2025-01-02
Blockchain Technology
Transaction Flow
Financial Intelligence

Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications

Authors: Fouad Trad, Ali Chehab | Published: 2024-03-26 | Updated: 2024-06-10
Evolution of AI
Prompt Engineering
Malware Classification

To Err is Machine: Vulnerability Detection Challenges LLM Reasoning

Authors: Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Hengbo Tong, Swarna Das, Earl T. Barr, Wei Le | Published: 2024-03-25 | Updated: 2025-01-07
DoS Mitigation
LLM Security
Prompt Injection