Boosting Model Inversion Attacks with Adversarial Examples Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24 PoisoningAdversarial ExampleAdversarial attack 2023.06.24 2025.05.28 Literature Database
Creating Valid Adversarial Examples of Malware Authors: Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia | Published: 2023-06-23 Malware ClassificationMalware Detection MethodAdversarial attack 2023.06.23 2025.05.28 Literature Database
An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23 Performance EvaluationThreat modelingFederated Learning 2023.06.23 2025.05.28 Literature Database
Visual Adversarial Examples Jailbreak Aligned Large Language Models Authors: Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Peter Henderson, Mengdi Wang, Prateek Mittal | Published: 2023-06-22 | Updated: 2023-08-16 Prompt InjectionInappropriate Content GenerationAdversarial attack 2023.06.22 2025.05.28 Literature Database
Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection Authors: Mert Nakıp, Baran Can Gül, Erol Gelenbe | Published: 2023-06-22 | Updated: 2023-11-28 Algorithm DesignMalware Detection MethodFederated Learning 2023.06.22 2025.05.28 Literature Database
FLAG: Finding Line Anomalies (in code) with Generative AI Authors: Baleegh Ahmad, Benjamin Tan, Ramesh Karri, Hammond Pearce | Published: 2023-06-22 Program AnalysisMalware Detection MethodFeature Extraction Method 2023.06.22 2025.05.28 Literature Database
Do you still need a manual smart contract audit? Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais | Published: 2023-06-21 | Updated: 2023-06-22 Smart ContractProgram AnalysisThreat modeling 2023.06.21 2025.05.28 Literature Database
Cryptographic ransomware encryption detection: Survey Authors: Kenan Begovic, Abdulaziz Al-Ali, Qutaibah Malluhi | Published: 2023-06-21 API Monitoring MethodMalware DetectionCryptography 2023.06.21 2025.05.28 Literature Database
Universal adversarial perturbations for multiple classification tasks with quantum classifiers Authors: Yun-Zhong Qiu | Published: 2023-06-21 | Updated: 2023-10-25 Optimization MethodsComputational EfficiencyQuantum Cryptography Technology 2023.06.21 2025.05.28 Literature Database
Adversarial Training Should Be Cast as a Non-Zero-Sum Game Authors: Alexander Robey, Fabian Latorre, George J. Pappas, Hamed Hassani, Volkan Cevher | Published: 2023-06-19 | Updated: 2024-03-18 AlgorithmAdversarial ExampleOptimization Methods 2023.06.19 2025.05.28 Literature Database