Literature Database

An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding

Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30
Program Analysis
Prompt Injection
Prompt leaking

LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs

Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30
Program Analysis
Prompt Injection
Vulnerability detection

Bilateral Differentially Private Vertical Federated Boosted Decision Trees

Authors: Bokang Zhang, Zhikun Zhang, Haodong Jiang, Yang Liu, Lihao Zheng, Yuxiao Zhou, Shuaiting Huang, Junfeng Wu | Published: 2025-04-30
Privacy Risk Management
Differential Privacy
Watermark Design

XBreaking: Explainable Artificial Intelligence for Jailbreaking LLMs

Authors: Marco Arazzi, Vignesh Kumar Kembu, Antonino Nocera, Vinod P | Published: 2025-04-30
Disabling Safety Mechanisms of LLM
Prompt Injection
Explanation Method

Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs

Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30
LLM Performance Evaluation
Poisoning attack on RAG
Attack Type

Traceback of Poisoning Attacks to Retrieval-Augmented Generation

Authors: Baolei Zhang, Haoran Xin, Minghong Fang, Zhuqing Liu, Biao Yi, Tong Li, Zheli Liu | Published: 2025-04-30
Poisoning attack on RAG
Attack Type
Detection of Poisonous Data

Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation

Authors: Bikash Saha, Nanda Rani, Sandeep Kumar Shukla | Published: 2025-04-30
Prompt leaking
Compliance with Ethical Guidelines
Generative AI in Financial Services

Padding Matters — Exploring Function Detection in PE Files

Authors: Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich | Published: 2025-04-30
PE Malware Classification
Program Analysis
Function Boundary Pair Formation

How to Backdoor the Knowledge Distillation

Authors: Chen Wu, Qian Ma, Prasenjit Mitra, Sencun Zhu | Published: 2025-04-30
Backdoor Attack
Adversarial Learning
Vulnerabilities of Knowledge Distillation

Generate-then-Verify: Reconstructing Data from Limited Published Statistics

Authors: Terrance Liu, Eileen Xiao, Adam Smith, Pratiksha Thaker, Zhiwei Steven Wu | Published: 2025-04-29 | Updated: 2025-06-11
Privacy protection framework
Privacy Enhancing Technology
整数計画法