Pretraining Data Detection for Large Language Models: A Divergence-based Calibration Method Authors: Weichao Zhang, Ruqing Zhang, Jiafeng Guo, Maarten de Rijke, Yixing Fan, Xueqi Cheng | Published: 2024-09-23 | Updated: 2025-05-21 Disabling Safety Mechanisms of LLMModel Performance EvaluationInformation Extraction 2024.09.23 2025.05.27 Literature Database
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm Authors: Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin | Published: 2024-09-21 | Updated: 2024-10-06 Backdoor AttackModel Performance EvaluationDefense Method 2024.09.21 2025.05.27 Literature Database
Extracting Memorized Training Data via Decomposition Authors: Ellen Su, Anu Vellore, Amy Chang, Raffaele Mura, Blaine Nelson, Paul Kassianik, Amin Karbasi | Published: 2024-09-18 | Updated: 2024-10-01 Training Data Extraction MethodPrompting StrategyModel Performance Evaluation 2024.09.18 2025.05.27 Literature Database
Artemis: Efficient Commit-and-Prove SNARKs for zkML Authors: Hidde Lycklama, Alexander Viand, Nikolay Avramov, Nicolas Küchler, Anwar Hithnawi | Published: 2024-09-18 FrameworkModel Performance EvaluationCryptography 2024.09.18 2025.05.27 Literature Database
Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments Authors: Maria Rigaki, Carlos Catania, Sebastian Garcia | Published: 2024-09-17 Dataset GenerationFrameworkModel Performance Evaluation 2024.09.17 2025.05.27 Literature Database
DomURLs_BERT: Pre-trained BERT-based Model for Malicious Domains and URLs Detection and Classification Authors: Abdelkader El Mahdaouy, Salima Lamsiyah, Meryem Janati Idrissi, Hamza Alami, Zakaria Yartaoui, Ismail Berrada | Published: 2024-09-13 Dataset GenerationMalware ClassificationModel Performance Evaluation 2024.09.13 2025.05.27 Literature Database
FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition Authors: Zhenhua Xu, Wenpeng Xing, Zhebo Wang, Chang Hu, Chen Jie, Meng Han | Published: 2024-09-13 LLM SecurityFingerprinting MethodModel Performance Evaluation 2024.09.13 2025.05.27 Literature Database
Sub-graph Based Diffusion Model for Link Prediction Authors: Hang Li, Wei Jin, Geri Skenderi, Harry Shomer, Wenzhuo Tang, Wenqi Fan, Jiliang Tang | Published: 2024-09-13 Simulation Result EvaluationModel Performance EvaluationLink Prediction Method 2024.09.13 2025.05.27 Literature Database
Advancing Malicious Website Identification: A Machine Learning Approach Using Granular Feature Analysis Authors: Kinh Tran, Dusan Sovilj | Published: 2024-09-11 Dataset GenerationModel Performance EvaluationMalicious Website Detection 2024.09.11 2025.05.27 Literature Database
Revisiting Static Feature-Based Android Malware Detection Authors: Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi | Published: 2024-09-11 Dataset GenerationPoisoningModel Performance Evaluation 2024.09.11 2025.05.27 Literature Database