Respond to Change with Constancy: Instruction-tuning with LLM for Non-I.I.D. Network Traffic Classification Authors: Xinjie Lin, Gang Xiong, Gaopeng Gou, Wenqi Dong, Jing Yu, Zhen Li, Wei Xia | Published: 2025-05-27 トラフィック分類Model Performance EvaluationStructural Learning 2025.05.27 2025.05.29 Literature Database
DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response Authors: Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi | Published: 2025-05-26 HallucinationModel Performance EvaluationEvaluation Method 2025.05.26 2025.05.28 Literature Database
What Really Matters in Many-Shot Attacks? An Empirical Study of Long-Context Vulnerabilities in LLMs Authors: Sangyeop Kim, Yohan Lee, Yongwoo Song, Kimin Lee | Published: 2025-05-26 Prompt InjectionModel Performance EvaluationLarge Language Model 2025.05.26 2025.05.28 Literature Database
CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis Authors: Sofia Della Penna, Roberto Natella, Vittorio Orbinato, Lorenzo Parracino, Luciano Pianese | Published: 2025-04-08 LLM ApplicationModel Performance EvaluationLarge Language Model 2025.04.08 2025.05.27 Literature Database
Separator Injection Attack: Uncovering Dialogue Biases in Large Language Models Caused by Role Separators Authors: Xitao Li, Haijun Wang, Jiang Wu, Ting Liu | Published: 2025-04-08 Indirect Prompt InjectionPrompting StrategyModel Performance Evaluation 2025.04.08 2025.05.27 Literature Database
Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM Authors: Jiuyang Bu, Wenkai Li, Zongwei Li, Zeng Zhang, Xiaoqi Li | Published: 2025-04-07 Smart ContractModel Performance EvaluationVulnerability Analysis 2025.04.07 2025.05.27 Literature Database
Are You Getting What You Pay For? Auditing Model Substitution in LLM APIs Authors: Will Cai, Tianneng Shi, Xuandong Zhao, Dawn Song | Published: 2025-04-07 Identification of AI OutputAPI SecurityModel Performance Evaluation 2025.04.07 2025.05.27 Literature Database
Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries Authors: Furkan Çolhak, Hasan Coşkun, Tsafac Nkombong Regine Cyrille, Tedi Hoxa, Mert İlhan Ecevit, Mehmet Nafiz Aydın | Published: 2025-04-02 | Updated: 2025-04-03 Model Performance EvaluationMachine Learning AlgorithmAutomotive Network Security 2025.04.02 2025.05.27 Literature Database
LightDefense: A Lightweight Uncertainty-Driven Defense against Jailbreaks via Shifted Token Distribution Authors: Zhuoran Yang, Jie Peng, Zhen Tan, Tianlong Chen, Yanyong Zhang | Published: 2025-04-02 Prompt InjectionModel Performance EvaluationUncertainty Measurement 2025.04.02 2025.05.27 Literature Database
Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code Authors: Roxane Cohen, Robin David, Florian Yger, Fabrice Rossi | Published: 2025-04-02 Explainability of Graph Machine LearningModel Performance EvaluationMachine Learning Algorithm 2025.04.02 2025.05.27 Literature Database