Literature Database

Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples

Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05
Algorithm
Algorithm Design
Dataset Generation

Enhancing Multi-Criteria Decision Analysis with AI: Integrating Analytic Hierarchy Process and GPT-4 for Automated Decision Support

Authors: Igor Svoboda, Dmytro Lande | Published: 2024-02-12
Evolution of AI
Expert Opinion Collection
Expert Opinion Collection Process

Utilizing Large LanguageModels to Detect Privacy Leaks in Mini-App Code

Authors: Liming Jiang | Published: 2024-02-12
LLM Security
Data Privacy Assessment
Privacy Protection

Differentially Private Training of Mixture of Experts Models

Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11
LLM Performance Evaluation
Privacy Protection Method
Model Performance Evaluation

Blockchain Metrics and Indicators in Cryptocurrency Trading

Authors: Juan C. King, Roberto Dale, José M. Amigó | Published: 2024-02-11
Blockchain Technology
Transaction Profit and Performance
Transaction Flow

MAGNETO: Edge AI for Human Activity Recognition — Privacy and Personalization

Authors: Jingwei Zuo, George Arvanitakis, Mthandazo Ndhlovu, Hakim Hacid | Published: 2024-02-11 | Updated: 2024-02-14
Edge Computing
Privacy Protection
Real-Time Inference

Whispers in the Machine: Confidentiality in Agentic Systems

Authors: Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer | Published: 2024-02-10 | Updated: 2025-08-12
Security Assurance
Prompt Injection
攻撃戦略分析

Sentinels of the Stream: Unleashing Large Language Models for Dynamic Packet Classification in Software Defined Networks — Position Paper

Authors: Shariq Murtuza | Published: 2024-02-10
LLM Security
Watermarking
Network Threat Detection

System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks

Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13
O-RAN Security
Cyber Attack
Adversarial Attack Detection

Systematic Assessment of Tabular Data Synthesis Algorithms

Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13
Data Privacy Assessment
Data Generation
Privacy Protection Method