Literature Database

Opening A Pandora’s Box: Things You Should Know in the Era of Custom GPTs

Authors: Guanhong Tao, Siyuan Cheng, Zhuo Zhang, Junmin Zhu, Guangyu Shen, Xiangyu Zhang | Published: 2023-12-31
Cybersecurity
Phishing Attack
Prompt Injection

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

Authors: Siva Raja Sindiramutty | Published: 2023-12-30
Role of AI and Automation
XAI (Explainable AI)
Cybersecurity

Jatmo: Prompt Injection Defense by Task-Specific Finetuning

Authors: Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David Wagner | Published: 2023-12-29 | Updated: 2024-01-08
LLM Security
Cyber Attack
Prompt Injection

AIJack: Let’s Hijack AI! Security and Privacy Risk Simulator for Machine Learning

Authors: Hideaki Takahashi | Published: 2023-12-29 | Updated: 2024-04-08
Watermarking
Poisoning
Federated Learning

Differentially Private Low-Rank Adaptation of Large Language Model Using Federated Learning

Authors: Xiao-Yang Liu, Rongyi Zhu, Daochen Zha, Jiechao Gao, Shan Zhong, Matt White, Meikang Qiu | Published: 2023-12-29 | Updated: 2024-06-02
Privacy Protection Method
Model Performance Evaluation
Federated Learning

Can you See me? On the Visibility of NOPs against Android Malware Detectors

Authors: Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger | Published: 2023-12-28
Code Change Analysis
Attack Method
Watermark Evaluation

Optimizing watermarks for large language models

Authors: Bram Wouters | Published: 2023-12-28
Optimization Methods
Watermark Robustness
Watermark Evaluation

Attack Tree Analysis for Adversarial Evasion Attacks

Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28
Poisoning
Adversarial attack
Watermark Evaluation

Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation

Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo | Published: 2023-12-28
Poisoning
Machine Unlearning
Watermark Evaluation

Anticipated Network Surveillance — An extrapolated study to predict cyber-attacks using Machine Learning and Data Analytics

Authors: Aviral Srivastava, Dhyan Thakkar, Sharda Valiveti, Pooja Shah, Gaurang Raval | Published: 2023-12-27
Dataset Generation
Model Performance Evaluation
Literature List