Literature Database

ClausewitzGPT Framework: A New Frontier in Theoretical Large Language Model Enhanced Information Operations

Authors: Benjamin Kereopa-Yorke | Published: 2023-10-11
Framework
Risk Management

Secure Decentralized Learning with Blockchain

Authors: Xiaoxue Zhang, Yifan Hua, Chen Qian | Published: 2023-10-10 | Updated: 2024-03-11
Blockchain Technology
Poisoning
Federated Learning

Catastrophic Jailbreak of Open-source LLMs via Exploiting Generation

Authors: Yangsibo Huang, Samyak Gupta, Mengzhou Xia, Kai Li, Danqi Chen | Published: 2023-10-10
Prompt Injection
Attack Evaluation
Adversarial attack

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

Authors: Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly | Published: 2023-10-10
Prompt Injection
Information Gathering Methods
Threat Actor Support

Text Embeddings Reveal (Almost) As Much As Text

Authors: John X. Morris, Volodymyr Kuleshov, Vitaly Shmatikov, Alexander M. Rush | Published: 2023-10-10
Membership Inference
Model Inversion
Model Evaluation

Statistical properties and privacy guarantees of an original distance-based fully synthetic data generation method

Authors: Rémy Chapelle, Bruno Falissard | Published: 2023-10-10
Data Generation
Privacy Classification
Membership Disclosure Risk

A Semantic Invariant Robust Watermark for Large Language Models

Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19
Watermarking
Prompt Injection
Performance Evaluation

SCAR: Power Side-Channel Analysis at RTL-Level

Authors: Amisha Srivastava, Sanjay Das, Navnil Choudhury, Rafail Psiakis, Pedro Henrique Silva, Debjit Pal, Kanad Basu | Published: 2023-10-10
Prompt Injection
Cryptography
Vulnerability Prediction

Differentially Private Multi-Site Treatment Effect Estimation

Authors: Tatsuki Koga, Kamalika Chaudhuri, David Page | Published: 2023-10-10
Privacy Classification
Performance Evaluation
Information Hiding Techniques

LLM for SoC Security: A Paradigm Shift

Authors: Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, Farimah Farahmandi | Published: 2023-10-09
LLM Application
Prompt Injection
Vulnerability detection