What Was Your Prompt? A Remote Keylogging Attack on AI Assistants Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky | Published: 2024-03-14 LLM SecurityToken Processing and CollectionToken Collection Method 2024.03.14 2025.05.27 Literature Database
Duwak: Dual Watermarks in Large Language Models Authors: Chaoyi Zhu, Jeroen Galjaard, Pin-Yu Chen, Lydia Y. Chen | Published: 2024-03-12 | Updated: 2024-08-08 WatermarkingToken Processing and CollectionWatermark Evaluation 2024.03.12 2025.05.27 Literature Database
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers Authors: Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt | Published: 2023-10-18 Dataset GenerationToken Processing and CollectionMalware Classification 2023.10.18 2025.05.28 Literature Database