Literature Database

SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering

Authors: Shihab Ahmed, A B M Mohaimenur Rahman, Md Morshed Alam, Md Sajidul Islam Sajid | Published: 2025-01-01
Cybersecurity
Prompt Injection
Prompt Engineering

Shifting-Merging: Secure, High-Capacity and Efficient Steganography via Large Language Models

Authors: Minhao Bai, Jinshuai Yang, Kaiyi Pang, Yongfeng Huang, Yue Gao | Published: 2025-01-01
LLM Performance Evaluation
Data Obfuscation

Beyond Static Datasets: A Behavior-Driven Entity-Specific Simulation to Overcome Data Scarcity and Train Effective Crypto Anti-Money Laundering Models

Authors: Dinesh Srivasthav P, Manoj Apte | Published: 2025-01-01
Transaction Flow
Transaction Generation Method

Ensuring superior learning outcomes and data security for authorized learner

Authors: Jeongho Bang, Wooyeong Song, Kyujin Shin, Yong-Su Kim | Published: 2025-01-01
Security Assurance
Improvement of Learning

SPDZCoder: Combining Expert Knowledge with LLMs for Generating Privacy-Computing Code

Authors: Xiaoning Dong, Peilin Xin, Jia Li, Wei Xu | Published: 2024-12-31 | Updated: 2025-03-21
Algorithm
Program Interpretation Graph
Multi-Party Computation

Machine Learning-Based Security Policy Analysis

Authors: Krish Jain, Joann Sum, Pranav Kapoor, Amir Eaman | Published: 2024-12-30 | Updated: 2025-01-06
SELinux Policy Anomaly Detection

ExpShield: Safeguarding Web Text from Unauthorized Crawling and Language Modeling Exploitation

Authors: Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong | Published: 2024-12-30 | Updated: 2025-05-07
Text Perturbation Method
Backdoor Detection
Watermarking Technology

Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense

Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15
Prompt leaking
Model DoS
Information Security

Robust Matrix Completion for Discrete Rating-Scale Data

Authors: Aurore Archimbaud, Andreas Alfons, Ines Wilms | Published: 2024-12-30
Algorithm
Simulation Result Evaluation

Reconciling Privacy and Explainability in High-Stakes: A Systematic Inquiry

Authors: Supriya Manna, Niladri Sett | Published: 2024-12-30 | Updated: 2025-05-22
Privacy Management
Robust explainability
Differential Privacy