Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05 AlgorithmAlgorithm DesignDataset Generation 2024.02.12 2025.05.27 Literature Database
Enhancing Multi-Criteria Decision Analysis with AI: Integrating Analytic Hierarchy Process and GPT-4 for Automated Decision Support Authors: Igor Svoboda, Dmytro Lande | Published: 2024-02-12 Evolution of AIExpert Opinion CollectionExpert Opinion Collection Process 2024.02.12 2025.05.27 Literature Database
Utilizing Large LanguageModels to Detect Privacy Leaks in Mini-App Code Authors: Liming Jiang | Published: 2024-02-12 LLM SecurityData Privacy AssessmentPrivacy Protection 2024.02.12 2025.05.27 Literature Database
Differentially Private Training of Mixture of Experts Models Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11 LLM Performance EvaluationPrivacy Protection MethodModel Performance Evaluation 2024.02.11 2025.05.27 Literature Database
Blockchain Metrics and Indicators in Cryptocurrency Trading Authors: Juan C. King, Roberto Dale, José M. Amigó | Published: 2024-02-11 Blockchain TechnologyTransaction Profit and PerformanceTransaction Flow 2024.02.11 2025.05.27 Literature Database
MAGNETO: Edge AI for Human Activity Recognition — Privacy and Personalization Authors: Jingwei Zuo, George Arvanitakis, Mthandazo Ndhlovu, Hakim Hacid | Published: 2024-02-11 | Updated: 2024-02-14 Edge ComputingPrivacy ProtectionReal-Time Inference 2024.02.11 2025.05.27 Literature Database
Whispers in the Machine: Confidentiality in Agentic Systems Authors: Jonathan Evertz, Merlin Chlosta, Lea Schönherr, Thorsten Eisenhofer | Published: 2024-02-10 | Updated: 2025-08-12 Security AssurancePrompt Injection攻撃戦略分析 2024.02.10 2025.08.14 Literature Database
Sentinels of the Stream: Unleashing Large Language Models for Dynamic Packet Classification in Software Defined Networks — Position Paper Authors: Shariq Murtuza | Published: 2024-02-10 LLM SecurityWatermarkingNetwork Threat Detection 2024.02.10 2025.05.27 Literature Database
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13 O-RAN SecurityCyber AttackAdversarial Attack Detection 2024.02.10 2025.05.27 Literature Database
Systematic Assessment of Tabular Data Synthesis Algorithms Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13 Data Privacy AssessmentData GenerationPrivacy Protection Method 2024.02.09 2025.05.27 Literature Database