Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12 Prompt InjectionModel Performance EvaluationLog Analysis Method 2024.08.12 2025.05.27 Literature Database
MPC-Minimized Secure LLM Inference Authors: Deevashwer Rathee, Dacheng Li, Ion Stoica, Hao Zhang, Raluca Popa | Published: 2024-08-07 LLM Performance EvaluationMPC AlgorithmModel Performance Evaluation 2024.08.07 2025.05.27 Literature Database
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06 Phishing DetectionModel Performance EvaluationDefense Method 2024.08.06 2025.05.27 Literature Database
Hide and Seek: Fingerprinting Large Language Models with Evolutionary Learning Authors: Dmitri Iourovitski, Sanat Sharma, Rakshak Talwar | Published: 2024-08-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.08.06 2025.05.27 Literature Database
From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection Authors: Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén, Karim Khalil | Published: 2024-08-05 LLM Performance EvaluationModel Performance EvaluationVulnerability Management 2024.08.05 2025.05.27 Literature Database
PromptSAM+: Malware Detection based on Prompt Segment Anything Model Authors: Xingyuan Wei, Yichen Liu, Ce Li, Ning Li, Degang Sun, Yan Wang | Published: 2024-08-04 WatermarkingMalware ClassificationModel Performance Evaluation 2024.08.04 2025.05.27 Literature Database
Assessing Robustness of Machine Learning Models using Covariate Perturbations Authors: Arun Prakash R, Anwesha Bhattacharyya, Joel Vaughan, Vijayan N. Nair | Published: 2024-08-02 Perturbation Method for Categorical VariablesModel Performance EvaluationStability of Predictions 2024.08.02 2025.05.27 Literature Database
Verification of Machine Unlearning is Fragile Authors: Binchi Zhang, Zihan Chen, Cong Shen, Jundong Li | Published: 2024-08-01 AlgorithmModel Performance EvaluationComputational Efficiency 2024.08.01 2025.05.27 Literature Database
Jailbreaking Text-to-Image Models with LLM-Based Agents Authors: Yingkai Dong, Zheng Li, Xiangtao Meng, Ning Yu, Shanqing Guo | Published: 2024-08-01 | Updated: 2024-09-09 LLM SecurityPrompt InjectionModel Performance Evaluation 2024.08.01 2025.05.27 Literature Database
Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis Authors: Zhipeng He, Chun Ouyang, Laith Alzubaidi, Alistair Barros, Catarina Moreira | Published: 2024-07-16 | Updated: 2024-10-04 Model Performance EvaluationAttack EvaluationFeature Interdependence 2024.07.16 2025.05.27 Literature Database