Literature Database

Excuse me, sir? Your language model is leaking (information)

Authors: Or Zamir | Published: 2024-01-18
Watermarking
Prompt Injection
Dynamic Error Correction Code

Self-Rewarding Language Models

Authors: Weizhe Yuan, Richard Yuanzhe Pang, Kyunghyun Cho, Xian Li, Sainbayar Sukhbaatar, Jing Xu, Jason Weston | Published: 2024-01-18 | Updated: 2024-02-08
Alignment
Model Architecture
Deep Learning

Lateral Phishing With Large Language Models: A Large Organization Comparative Study

Authors: Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-01-18 | Updated: 2025-04-15
Phishing Attack
Prompt Injection

MedBlindTuner: Towards Privacy-preserving Fine-tuning on Biomedical Images with Transformers and Fully Homomorphic Encryption

Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-01-17
Watermarking
Privacy Protection
Medical Image Analysis

Zero Trust Implementation in the Emerging Technologies Era: Survey

Authors: Abraham Itzhak Weinberg, Kelly Cohen | Published: 2024-01-17
Role of AI and Automation
Zero Trust
Dynamic Policies and Access Control

Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN

Authors: Bruno Missi Xavier, Merim Dzaferagic, Irene Vilà, Magnos Martinello, Marco Ruffini | Published: 2024-01-17
O-RAN Security
Cyber Attack
Data Collection

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

Authors: Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, Lubna Luxmi Dhirani | Published: 2024-01-17
DDoS Attack
Cybersecurity
Advancements in Medical IoT

AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection

Authors: Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | Published: 2024-01-17 | Updated: 2024-01-21
Stacking Model
Phishing Detection
Deep Learning Method

Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs

Authors: Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert | Published: 2024-01-16
GPU Vulnerability
GPU Vulnerability
Watermark Evaluation

The Effect of Intrinsic Dataset Properties on Generalization: Unraveling Learning Differences Between Natural and Medical Images

Authors: Nicholas Konz, Maciej A. Mazurowski | Published: 2024-01-16 | Updated: 2024-02-21
Impact of Generalization
Medical Image Analysis
Watermark Evaluation