LLM Security Guard for Code Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari | Published: 2024-05-02 | Updated: 2024-05-03 LLM SecuritySecurity AnalysisPrompt Injection 2024.05.02 2025.05.27 Literature Database
Guardians of the Quantum GAN Authors: Archisman Ghosh, Debarshi Kundu, Avimita Chatterjee, Swaroop Ghosh | Published: 2024-04-24 | Updated: 2024-05-15 WatermarkingSecurity AnalysisQuantum Framework 2024.04.24 2025.05.27 Literature Database
An Investigation into Misuse of Java Security APIs by Large Language Models Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar | Published: 2024-04-04 Misuse of Security APISecurity AnalysisPrompt Injection 2024.04.04 2025.05.27 Literature Database
LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04 WatermarkingSecurity AnalysisAnomaly Detection Method 2024.04.03 2025.05.27 Literature Database
Securing Federated Learning with Control-Flow Attestation: A Novel Framework for Enhanced Integrity and Resilience against Adversarial Attacks Authors: Zahir Alsulaimawi | Published: 2024-03-15 Scalability AnalysisSecurity AnalysisFederated Learning 2024.03.15 2025.05.27 Literature Database
Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code Authors: Cristina Improta | Published: 2024-03-11 Security AnalysisBackdoor AttackPoisoning 2024.03.11 2025.05.27 Literature Database
Transfer Learning for Security: Challenges and Future Directions Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01 Security AnalysisPoisoningTransfer Learning 2024.03.01 2025.05.27 Literature Database
A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14 CybersecuritySecurity AnalysisAdvancements in Medical IoT 2024.01.14 2025.05.27 Literature Database
Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12 CybersecuritySecurity AnalysisPhysical layer security 2024.01.12 2025.05.27 Literature Database
Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11 WatermarkingSecurity AnalysisWatermark Evaluation 2024.01.11 2025.05.27 Literature Database