Literature Database

Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation

Authors: Bikash Saha, Nanda Rani, Sandeep Kumar Shukla | Published: 2025-04-30
Prompt leaking
Compliance with Ethical Guidelines
Generative AI in Financial Services

Padding Matters — Exploring Function Detection in PE Files

Authors: Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich | Published: 2025-04-30
PE Malware Classification
Program Analysis
Function Boundary Pair Formation

How to Backdoor the Knowledge Distillation

Authors: Chen Wu, Qian Ma, Prasenjit Mitra, Sencun Zhu | Published: 2025-04-30
Backdoor Attack
Adversarial Learning
Vulnerabilities of Knowledge Distillation

Generate-then-Verify: Reconstructing Data from Limited Published Statistics

Authors: Terrance Liu, Eileen Xiao, Adam Smith, Pratiksha Thaker, Zhiwei Steven Wu | Published: 2025-04-29 | Updated: 2025-06-11
Privacy protection framework
Privacy Enhancing Technology
整数計画法

ACE: A Security Architecture for LLM-Integrated App Systems

Authors: Evan Li, Tushin Mallick, Evan Rose, William Robertson, Alina Oprea, Cristina Nita-Rotaru | Published: 2025-04-29 | Updated: 2025-05-07
Indirect Prompt Injection
Prompt Injection
Information Flow Analysis

Secure Coding with AI, From Creation to Inspection

Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29
Dataset Applicability
Program Analysis
Vulnerability Management

Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications

Authors: Weizhe Wang, Yao Zhang, Kaitai Liang, Guangquan Xu, Hongpeng Bai, Qingyang Yan, Xi Zheng, Bin Wu | Published: 2025-04-29 | Updated: 2025-04-30
Content Compression Techniques
User Behavior Analysis
Vulnerability Assessment Method

Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks

Authors: Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry | Published: 2025-04-29
Online Learning
Poisoning
Performance Evaluation

Learning and Generalization with Mixture Data

Authors: Harsh Vardhan, Avishek Ghosh, Arya Mazumdar | Published: 2025-04-29
Sample Complexity
Mathematical Foundations
Detection of Poisonous Data

The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models

Authors: Swaroop Dora, Deven Lunkad, Naziya Aslam, S. Venkatesan, Sandeep Kumar Shukla | Published: 2025-04-29
Indirect Prompt Injection
Secure Communication Channel
Vulnerability Assessment Method