Literature Database

Zero-day attack and ransomware detection

Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08
Cybersecurity
Ransomware Assessment
Machine Learning Method

LaFA: Latent Feature Attacks on Non-negative Matrix Factorization

Authors: Minh Vu, Ben Nebgen, Erik Skau, Geigh Zollicoffer, Juan Castorena, Kim Rasmussen, Boian Alexandrov, Manish Bhattarai | Published: 2024-08-07
Watermarking
Attack Method
Adversarial Example

EnJa: Ensemble Jailbreak on Large Language Models

Authors: Jiahao Zhang, Zilong Wang, Ruofan Wang, Xingjun Ma, Yu-Gang Jiang | Published: 2024-08-07
Prompt Injection
Attack Method
Evaluation Method

MPC-Minimized Secure LLM Inference

Authors: Deevashwer Rathee, Dacheng Li, Ion Stoica, Hao Zhang, Raluca Popa | Published: 2024-08-07
LLM Performance Evaluation
MPC Algorithm
Model Performance Evaluation

Harnessing the Power of LLMs in Source Code Vulnerability Detection

Authors: Andrew A Mahyari | Published: 2024-08-07
LLM Performance Evaluation
Program Analysis
Vulnerability Management

Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis

Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06
Phishing Detection
Model Performance Evaluation
Defense Method

Malicious Internet Entity Detection Using Local Graph Inference

Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07
Algorithm
Graph Transformation
Evaluation Method

The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums

Authors: Vanessa Clairoux-Trepanier, Isa-May Beauchamp, Estelle Ruellan, Masarah Paquet-Clouston, Serge-Olivier Paquette, Eric Clay | Published: 2024-08-06 | Updated: 2024-10-01
LLM Performance Evaluation
Data Collection
Variable Extraction Method

Compromising Embodied Agents with Contextual Backdoor Attacks

Authors: Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao | Published: 2024-08-06
Backdoor Attack
Prompt Injection

Hide and Seek: Fingerprinting Large Language Models with Evolutionary Learning

Authors: Dmitri Iourovitski, Sanat Sharma, Rakshak Talwar | Published: 2024-08-06
LLM Performance Evaluation
Prompt Injection
Model Performance Evaluation