From ML to LLM: Evaluating the Robustness of Phishing Webpage Detection Models against Adversarial Attacks Authors: Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das | Published: 2024-07-29 | Updated: 2025-03-15 Dataset GenerationPhishing DetectionPrompt Injection 2024.07.29 2025.05.27 Literature Database
MLLMGuard: A Multi-dimensional Safety Evaluation Suite for Multimodal Large Language Models Authors: Tianle Gu, Zeyang Zhou, Kexin Huang, Dandan Liang, Yixu Wang, Haiquan Zhao, Yuanqi Yao, Xingge Qiao, Keqing Wang, Yujiu Yang, Yan Teng, Yu Qiao, Yingchun Wang | Published: 2024-06-11 | Updated: 2024-06-13 LLM Performance EvaluationDataset GenerationEvaluation Method 2024.06.11 2025.05.27 Literature Database
Differentially Private Tabular Data Synthesis using Large Language Models Authors: Toan V. Tran, Li Xiong | Published: 2024-06-03 Dataset GenerationPrivacy Protection MethodModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
Federated Domain-Specific Knowledge Transfer on Large Language Models Using Synthetic Data Authors: Haoran Li, Xinyuan Zhao, Dadi Guo, Hanlin Gu, Ziqian Zeng, Yuxing Han, Yangqiu Song, Lixin Fan, Qiang Yang | Published: 2024-05-23 Few-Shot LearningDataset GenerationPrivacy Protection Method 2024.05.23 2025.05.27 Literature Database
LLMPot: Dynamically Configured LLM-based Honeypot for Industrial Protocol and Physical Process Emulation Authors: Christoforos Vasilatos, Dunia J. Mahboobeh, Hithem Lamri, Manaar Alam, Michail Maniatakos | Published: 2024-05-09 | Updated: 2025-05-19 ICS Honeypot DevelopmentDataset GenerationModel Performance Evaluation 2024.05.09 2025.05.27 Literature Database
Analysis and prevention of AI-based phishing email attacks Authors: Chibuike Samuel Eze, Lior Shamir | Published: 2024-05-08 Dataset GenerationPhishing DetectionMachine Learning Method 2024.05.08 2025.05.27 Literature Database
SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence Authors: Hangyuan Ji, Jian Yang, Linzheng Chai, Chaoren Wei, Liqun Yang, Yunlong Duan, Yunli Wang, Tianzhen Sun, Hongcheng Guo, Tongliang Li, Changyu Ren, Zhoujun Li | Published: 2024-05-06 | Updated: 2024-06-03 LLM Performance EvaluationCybersecurityDataset Generation 2024.05.06 2025.05.27 Literature Database
Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset Authors: Peace Azugo, Hein Venter, Mike Wa Nkongolo | Published: 2024-04-19 CybersecurityDataset GenerationRansomware Assessment 2024.04.19 2025.05.27 Literature Database
Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingCybersecurityDataset Generation 2024.04.11 2025.05.27 Literature Database
Prompt Public Large Language Models to Synthesize Data for Private On-device Applications Authors: Shanshan Wu, Zheng Xu, Yanxiang Zhang, Yuanbo Zhang, Daniel Ramage | Published: 2024-04-05 | Updated: 2024-08-07 Dataset GenerationPrivacy Protection MethodFederated Learning 2024.04.05 2025.05.27 Literature Database