Literature Database

Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare

Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19
Cybersecurity
Proactive Defense
Strategic Game

Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention

Authors: Ellie Prosser, Matthew Edwards | Published: 2024-03-14
LLM Performance Evaluation
Online Safety Advice
Prompt Injection

AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting

Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14
Prompt Injection
Structural Attack
Defense Method

Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems

Authors: Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia | Published: 2024-03-14
IoMT Security
Anomaly Detection Method
Federated Learning

What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky | Published: 2024-03-14
LLM Security
Token Processing and Collection
Token Collection Method

An Extensive Comparison of Static Application Security Testing Tools

Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14
Toolkit Comparison
Vulnerability Management
Evaluation Method

A Decade’s Battle on Dataset Bias: Are We There Yet?

Authors: Zhuang Liu, Kaiming He | Published: 2024-03-13 | Updated: 2025-03-03
Data Curation
Bias Elimination in Training Data
Deep Learning

SAP: Corrective Machine Unlearning with Scaled Activation Projection for Label Noise Robustness

Authors: Sangamesh Kodge, Deepak Ravikumar, Gobinda Saha, Kaushik Roy | Published: 2024-03-13 | Updated: 2025-01-02
Algorithm
Watermarking
Label

A Sophisticated Framework for the Accurate Detection of Phishing Websites

Authors: Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed | Published: 2024-03-13
Phishing Detection
Framework
Model Performance Evaluation

SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks

Authors: Guy Amit, Abigail Goldsteen, Ariel Farkash | Published: 2024-03-13
Privacy Protection Method
Membership Inference
Model Performance Evaluation