Literature Database

Labeling without Seeing? Blind Annotation for Privacy-Preserving Entity Resolution

Authors: Yixiang Yao, Weizhao Jin, Srivatsan Ravi | Published: 2023-08-07
Watermarking
Data Protection Method
Cryptography

“Do Anything Now”: Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models

Authors: Xinyue Shen, Zeyuan Chen, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-08-07 | Updated: 2024-05-15
LLM Security
Character Role Acting
Prompt Injection

When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection

Authors: Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux | Published: 2023-08-07
Watermarking
Data Protection Method
Poisoning

Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing

Authors: Wai Man Si, Michael Backes, Yang Zhang | Published: 2023-08-07
Watermarking
Prompt Injection
Challenges of Generative Models

PURL: Safe and Effective Sanitization of Link Decoration

Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby | Published: 2023-08-07 | Updated: 2024-03-06
Watermarking
Data Protection Method
Data Collection

A reading survey on adversarial machine learning: Adversarial attacks and their understanding

Authors: Shashank Kotyan | Published: 2023-08-07
Adversarial Example
Adversarial Attack Methods
Defense Method

GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis

Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu | Published: 2023-08-07 | Updated: 2024-05-06
Watermarking
Vulnerability detection
Static Analysis

Exploiting Code Symmetries for Learning Program Semantics

Authors: Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana | Published: 2023-08-07 | Updated: 2024-09-08
Program Interpretation Graph
Machine Learning Technology
Vulnerability detection

PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification

Authors: Hongwei Yao, Jian Lou, Kui Ren, Zhan Qin | Published: 2023-08-05 | Updated: 2023-11-28
Soft Prompt Optimization
Prompt Injection
Watermark Robustness

Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges

Authors: Ziadoon K. Maseer, Robiah Yusof, Baidaa Al-Bander, Abdu Saif, Qusay Kanaan Kadhim | Published: 2023-08-05 | Updated: 2023-08-11
Intrusion Detection System
Machine Learning Method
Deep Learning Method