Literature Database

Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks

Authors: Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh | Published: 2023-10-16
Prompt Injection
Adversarial Example
Adversarial Training

Regularization properties of adversarially-trained linear regression

Authors: Antônio H. Ribeiro, Dave Zachariah, Francis Bach, Thomas B. Schön | Published: 2023-10-16
Convergence Property
Loss Term
Adversarial Training

Demystifying Poisoning Backdoor Attacks from a Statistical Perspective

Authors: Ganghua Wang, Xun Xian, Jayanth Srinivasa, Ashish Kundu, Xuan Bi, Mingyi Hong, Jie Ding | Published: 2023-10-16 | Updated: 2023-10-18
Poisoning
Model Performance Evaluation
Convergence Property

A Comprehensive Study of Privacy Risks in Curriculum Learning

Authors: Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li | Published: 2023-10-16
Membership Inference
Model Performance Evaluation
Attack Method

Improved Flow Recovery from Packet Data

Authors: Anthony Kenyon, David Elizondo, Lipika Deka | Published: 2023-10-15
Data Management System
Flow Inconsistency
Protocol Performance Evaluation

ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We?

Authors: Michael Fu, Chakkrit Tantithamthavorn, Van Nguyen, Trung Le | Published: 2023-10-15
Program Analysis
Prompt Engineering
Vulnerability Prediction

Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection

Authors: Marc Schmitt | Published: 2023-10-15
Cybersecurity
Network Threat Detection
Machine Learning Method

Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing

Authors: Marc Schmitt, Ivan Flechais | Published: 2023-10-15
Detection Rate of Phishing Attacks
Malicious Content Generation
Advanced Targeting

Private Synthetic Data Meets Ensemble Learning

Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15
Data Generation
Privacy Protection Method
evaluation metrics

A Blockchain-empowered Multi-Aggregator Federated Learning Architecture in Edge Computing with Deep Reinforcement Learning Optimization

Authors: Xiao Li, Weili Wu | Published: 2023-10-14
Byzantine Consensus Mechanism
Blockchain Technology
Federated Learning