Literature Database

Automated Phishing Detection Using URLs and Webpages

Authors: Huilin Wang, Bryan Hooi | Published: 2024-08-03 | Updated: 2024-08-16
Phishing Detection
Brand Recognition Problem
Prompt Injection

MCGMark: An Encodable and Robust Online Watermark for Tracing LLM-Generated Malicious Code

Authors: Kaiwen Ning, Jiachi Chen, Qingyuan Zhong, Tao Zhang, Yanlin Wang, Wei Li, Jingwen Zhang, Jianxing Yu, Yuming Feng, Weizhe Zhang, Zibin Zheng | Published: 2024-08-02 | Updated: 2025-04-21
Code Generation
Prompt Injection
Watermark Robustness

A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks

Authors: Charles Oredola, Adnan Ashraf | Published: 2024-08-02
SDN Architecture
Cybersecurity
Evaluation Method

Assessing Robustness of Machine Learning Models using Covariate Perturbations

Authors: Arun Prakash R, Anwesha Bhattacharyya, Joel Vaughan, Vijayan N. Nair | Published: 2024-08-02
Perturbation Method for Categorical Variables
Model Performance Evaluation
Stability of Predictions

LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems

Authors: Zhensu Sun, Haotian Zhu, Bowen Xu, Xiaoning Du, Li Li, David Lo | Published: 2024-08-02
LLM Performance Evaluation
Program Analysis
Self-Healing System

Verification of Machine Unlearning is Fragile

Authors: Binchi Zhang, Zihan Chen, Cong Shen, Jundong Li | Published: 2024-08-01
Algorithm
Model Performance Evaluation
Computational Efficiency

Pathway to Secure and Trustworthy ZSM for LLMs: Attacks, Defense, and Opportunities

Authors: Sunder Ali Khowaja, Parus Khuwaja, Kapal Dev, Hussam Al Hamadi, Engin Zeydan | Published: 2024-08-01 | Updated: 2025-01-06
LLM Security
Membership Inference
Trust Evaluation Module

Jailbreaking Text-to-Image Models with LLM-Based Agents

Authors: Yingkai Dong, Zheng Li, Xiangtao Meng, Ning Yu, Shanqing Guo | Published: 2024-08-01 | Updated: 2024-09-09
LLM Security
Prompt Injection
Model Performance Evaluation

A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality

Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft | Published: 2024-08-01
Security Analysis
Prompt Injection
Vulnerability Management

OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack

Authors: Kuo Gai, Sicong Wang, Shihua Zhang | Published: 2024-08-01
Adversarial Training
Optimization Problem
Defense Method