Literature Database

Beyond Labeling Oracles: What does it mean to steal ML models?

Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13
Data Collection
Knowledge Extraction Method
evaluation metrics

5G Network Slicing: Analysis of Multiple Machine Learning Classifiers

Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03
Security Analysis
Network Slicing
Machine Learning Method

On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused?

Authors: Hangfan Zhang, Zhimeng Guo, Huaisheng Zhu, Bochuan Cao, Lu Lin, Jinyuan Jia, Jinghui Chen, Dinghao Wu | Published: 2023-10-02
LLM Performance Evaluation
Prompt Injection
Classification of Malicious Actors

LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples

Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04
Hallucination
Vulnerability of Adversarial Examples
Adversarial Learning

Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives

Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16
Security Analysis
Prompt Injection
Vulnerability Prediction

Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis

Authors: Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin | Published: 2023-10-02
DoS Mitigation
Stacking Model
Model Performance Evaluation

Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection

Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02
Watermarking
Security Analysis
Threat modeling

Learning Type Inference for Enhanced Dataflow Analysis

Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi | Published: 2023-10-01 | Updated: 2023-10-04
Watermarking
Dynamic Analysis
Evaluation Method

Performance evaluation of Machine learning algorithms for Intrusion Detection System

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01
Algorithm
Classification Pattern Analysis
Evaluation Method

Towards LLM-based Fact Verification on News Claims with a Hierarchical Step-by-Step Prompting Method

Authors: Xuan Zhang, Wei Gao | Published: 2023-09-30
Few-Shot Learning
Data Generation Method
Detection of Misinformation