Literature Database

User authentication system based on human exhaled breath physics

Authors: Mukesh Karunanethy, Rahul Tripathi, Mahesh V Panchagnula, Raghunathan Rengaswamy | Published: 2024-01-02
User Authentication System
Time-Related Features
Machine Learning Method

Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles

Authors: Sagar Dasgupta, Kazi Hassan Shakib, Mizanur Rahman | Published: 2024-01-02
GNSS Security
LSTM Model Performance Evaluation
Vulnerabilities in Autonomous Driving Technology

LLbezpeky: Leveraging Large Language Models for Vulnerability Detection

Authors: Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh | Published: 2024-01-02 | Updated: 2024-02-13
LLM Performance Evaluation
Prompt Injection
Vulnerability Management

PPBFL: A Privacy Protected Blockchain-based Federated Learning Model

Authors: Yang Li, Chunhe Xia, Wanshuang Lin, Tianbo Wang | Published: 2024-01-02 | Updated: 2024-01-08
Privacy Protection Method
Model Communication
Federated Learning

Detection and Defense Against Prominent Attacks on Preconditioned LLM-Integrated Virtual Assistants

Authors: Chun Fai Chan, Daniel Wankit Yip, Aysan Esmradi | Published: 2024-01-02
LLM Security
Character Role Acting
System Prompt Generation

A Novel Evaluation Framework for Assessing Resilience Against Prompt Injection Attacks in Large Language Models

Authors: Daniel Wankit Yip, Aysan Esmradi, Chun Fai Chan | Published: 2024-01-02
LLM Security
Prompt Injection
Attack Evaluation

Facebook Report on Privacy of fNIRS data

Authors: Md Imran Hossen, Sai Venkatesh Chilukoti, Liqun Shan, Vijay Srinivas Tida, Xiali Hei | Published: 2024-01-01
Privacy Protection Method
Model Performance Evaluation
Federated Learning

Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration

Authors: D. Dhinakaran, S. M. Udhaya Sankar, D. Selvaraj, S. Edwin Raja | Published: 2024-01-01
Watermarking
Privacy Protection Method
Federated Learning

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training

Authors: Haodong Li, Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu, Guoai Xu, Guosheng Xu, Haoyu Wang | Published: 2024-01-01
LLM Performance Evaluation
Dataset Generation
Prompt Injection

Improving the Privacy and Practicality of Objective Perturbation for Differentially Private Linear Learners

Authors: Rachel Redberg, Antti Koskela, Yu-Xiang Wang | Published: 2023-12-31
Hyperparameter Tuning
Privacy Protection Method
Watermark Evaluation