Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack Authors: Sagiv Antebi, Edan Habler, Asaf Shabtai, Yuval Elovici | Published: 2025-01-14 CybersecurityPrivacy ProtectionLarge Language Model 2025.01.14 2025.05.27 Literature Database
Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection Authors: Sina Ahmadi | Published: 2025-01-14 CybersecurityNetwork Threat DetectionDynamic Firewall 2025.01.14 2025.05.27 Literature Database
A Review on the Security Vulnerabilities of the IoMT against Malware Attacks and DDoS Authors: Lily Dzamesi, Nelly Elsayed | Published: 2025-01-13 IoMT SecurityCybersecurity 2025.01.13 2025.05.27 Literature Database
Exploring and Mitigating Adversarial Manipulation of Voting-Based Leaderboards Authors: Yangsibo Huang, Milad Nasr, Anastasios Angelopoulos, Nicholas Carlini, Wei-Lin Chiang, Christopher A. Choquette-Choo, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Ken Ziyu Liu, Ion Stoica, Florian Tramer, Chiyuan Zhang | Published: 2025-01-13 CybersecurityLarge Language ModelAttack Evaluation 2025.01.13 2025.05.27 Literature Database
A Novel Approach to Network Traffic Analysis: the HERA tool Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13 CybersecurityDataset GenerationNetwork Threat Detection 2025.01.13 2025.05.27 Literature Database
Logic Meets Magic: LLMs Cracking Smart Contract Vulnerabilities Authors: ZeKe Xiao, Qin Wang, Hammond Pearce, Shiping Chen | Published: 2025-01-13 LLM Performance EvaluationCybersecuritySmart Contract 2025.01.13 2025.05.27 Literature Database
Resilient Endurance-Aware NVM-based PUF against Learning-based Attacks Authors: Hassan Nassar, Ming-Liang Wei, Chia-Lin Yang, Jörg Henkel, Kuan-Hsun Chen | Published: 2025-01-10 CybersecurityCryptographyDurability Issue 2025.01.10 2025.05.27 Literature Database
Learning-based Detection of GPS Spoofing Attack for Quadrotors Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10 CybersecurityExperimental ValidationAttack Evaluation 2025.01.10 2025.05.27 Literature Database
Infecting Generative AI With Viruses Authors: David Noever, Forrest McKee | Published: 2025-01-09 CybersecurityData ObfuscationMalware Classification 2025.01.09 2025.05.27 Literature Database
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction Authors: Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane | Published: 2025-01-03 CybersecurityNetwork Threat DetectionFramework 2025.01.03 2025.05.27 Literature Database