Literature Database

Reconciling Privacy and Explainability in High-Stakes: A Systematic Inquiry

Authors: Supriya Manna, Niladri Sett | Published: 2024-12-30 | Updated: 2025-05-22
Privacy Management
Robust explainability
Differential Privacy

SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity

Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo | Published: 2024-12-30 | Updated: 2025-01-06
LLM Performance Evaluation
Cybersecurity
Prompt Injection

A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis

Authors: Narasimha Raghavan Veeraragavan, Svetlana Boudko, Jan Franz Nygård | Published: 2024-12-29
Kaplan-Meier Estimation
Privacy Protection
Cryptography

Standard-Deviation-Inspired Regularization for Improving Adversarial Robustness

Authors: Olukorede Fakorede, Modeste Atsague, Jin Tian | Published: 2024-12-27
Adversarial Example
Adversarial Training

CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers

Authors: Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He | Published: 2024-12-26 | Updated: 2025-03-31
LLM Security
Backdoor Attack
Vulnerability of Adversarial Examples

Detection and classification of DDoS flooding attacks by machine learning method

Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02
Cybersecurity
Network Threat Detection

Fundamental Limits in the Search for Less Discriminatory Algorithms — and How to Avoid Them

Authors: Benjamin Laufer, Manisch Raghavan, Solon Barocas | Published: 2024-12-24
Bias
Limitations of Non-Discriminatory Algorithms

A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification

Authors: Yuan Ma, Xu Ma, Jiankang Wei, Jinmeng Tang, Xiaoyu Zhang, Yilun Lyu, Kehao Chen, Jingtong Huang | Published: 2024-12-22 | Updated: 2025-01-06
Backdoor Attack
Poisoning

From Vulnerabilities to Remediation: A Systematic Literature Review of LLMs in Code Security

Authors: Enna Basic, Alberto Giaretta | Published: 2024-12-19 | Updated: 2025-04-14
Prompt Injection
Prompt leaking
Vulnerability detection

SATA: A Paradigm for LLM Jailbreak via Simple Assistive Task Linkage

Authors: Xiaoning Dong, Wenbo Hu, Wei Xu, Tianxing He | Published: 2024-12-19 | Updated: 2025-03-21
Prompt Injection
Large Language Model
Adversarial Learning