Literature Database

Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration

Authors: Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard | Published: 2023-12-21 | Updated: 2024-06-10
Watermarking
Privacy Protection Method
Watermark Evaluation

An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids

Authors: Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Cybersecurity
Dataset Generation
Network Node Configuration

A Learning oriented DLP System based on Classification Model

Authors: Kishu Gupta, Ashwani Kush | Published: 2023-12-21
Data Protection Method
Data Preprocessing
Model Performance Evaluation

Benchmark Evaluation of Anomaly-Based Intrusion Detection Systems in the Context of Smart Grids

Authors: Ömer Sen, Simon Glomb, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Model Interpretability
Anomaly Detection Method
Statistical Methods

Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis

Authors: Ömer Sen, Bozhidar Ivanov, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Cybersecurity
Data Generation
Attack Graph Generation

HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi | Published: 2023-12-21
CVE Information Extraction
Prompt Injection
Vulnerability Management

Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models

Authors: Jingwei Yi, Yueqi Xie, Bin Zhu, Emre Kiciman, Guangzhong Sun, Xing Xie, Fangzhao Wu | Published: 2023-12-21 | Updated: 2025-01-27
Indirect Prompt Injection
Malicious Prompt
Vulnerability Analysis

Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP

Authors: Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat | Published: 2023-12-20
SQL Injection Attack Detection
Watermarking
Computational Efficiency

Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey

Authors: Rabia Nasir, Humaira Ashraf, NZ Jhanjhi | Published: 2023-12-20
Clustering methods
Protocol Performance Evaluation
Trust Evaluation

Rethinking Randomized Smoothing from the Perspective of Scalability

Authors: Anupriya Kumari, Devansh Bhardwaj, Sukrit Jindal | Published: 2023-12-19 | Updated: 2024-10-24
Scalability Analysis
Robustness Evaluation
Computational Efficiency