Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing Authors: Asmita, Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun | Published: 2024-03-06 LLM SecurityFuzzingInitial Seed Generation 2024.03.06 2025.05.27 Literature Database
Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability Authors: Rajdeep Haldar, Yue Xing, Qifan Song | Published: 2024-03-06 | Updated: 2024-03-23 Clustering methodsAdversarial ExampleAdversarial Training 2024.03.06 2025.05.27 Literature Database
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz | Published: 2024-03-06 | Updated: 2025-05-13 Prompt InjectionMalware ClassificationFederated Learning 2024.03.06 2025.05.27 Literature Database
Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training Authors: Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas | Published: 2024-03-06 Privacy ProtectionPrivacy Protection MethodMulti-Party Computation 2024.03.06 2025.05.27 Literature Database
Enhancing Security in Federated Learning through Adaptive Consensus-Based Model Update Validation Authors: Zahir Alsulaimawi | Published: 2024-03-05 PoisoningFederated LearningDefense Method 2024.03.05 2025.05.27 Literature Database
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees Authors: Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei | Published: 2024-03-05 Backdoor AttackPoisoningDefense Method 2024.03.05 2025.05.27 Literature Database
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks Authors: Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti | Published: 2024-03-05 Backdoor AttackPoisoningFederated Learning 2024.03.05 2025.05.27 Literature Database
InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang | Published: 2024-03-05 | Updated: 2024-08-04 Indirect Prompt InjectionTaxonomy of AttacksVulnerability Analysis 2024.03.05 2025.05.27 Literature Database
Catch’em all: Classification of Rare, Prominent, and Novel Malware Families Authors: Maksim E. Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas | Published: 2024-03-04 Class ImbalancePrompt InjectionMalware Classification 2024.03.04 2025.05.27 Literature Database
KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection Authors: Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Hoon Wei Lim, Bryan Hooi | Published: 2024-03-04 | Updated: 2024-06-15 Phishing DetectionBrand Recognition ProblemPrompt Injection 2024.03.04 2025.05.27 Literature Database