Literature Database

Efficient Toxic Content Detection by Bootstrapping and Distilling Large Language Models

Authors: Jiang Zhang, Qiong Wu, Yiming Xu, Cheng Cao, Zheng Du, Konstantinos Psounis | Published: 2023-12-13
Prompting Strategy
Calculation of Output Harmfulness
Large Language Model

Defenses in Adversarial Machine Learning: A Survey

Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13
Poisoning
Adversarial Example
Defense Method

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13
Graph Transformation
Security Analysis
Program Analysis

Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification

Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13
Graph Neural Network
Fingerprinting Method
Robustness Evaluation

GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks

Authors: Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan | Published: 2023-12-13
Graph Neural Network
Data Privacy Assessment
Membership Inference

Maatphor: Automated Variant Analysis for Prompt Injection Attacks

Authors: Ahmed Salem, Andrew Paverd, Boris Köpf | Published: 2023-12-12
LLM Security
Prompt Injection
Evaluation Method

LLMs Perform Poorly at Concept Extraction in Cyber-security Research Literature

Authors: Maxime Würsch, Andrei Kucharavy, Dimitri Percia David, Alain Mermoud | Published: 2023-12-12
LLM Performance Evaluation
Data Preprocessing
Knowledge Extraction Method

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks

Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11
Poisoning
Robustness Evaluation
Adversarial attack

Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships

Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16
Security Analysis
Data Protection Method
Privacy Protection Method

Data-Free Hard-Label Robustness Stealing Attack

Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12
Watermarking
Robustness Evaluation
Watermark Evaluation