Rethinking How to Evaluate Language Model Jailbreak Authors: Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik | Published: 2024-04-09 | Updated: 2024-05-07 Prompt InjectionClassification of Malicious ActorsEvaluation Method 2024.04.09 2025.05.27 Literature Database
The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative Authors: Zhen Tan, Chengshuai Zhao, Raha Moraffah, Yifan Li, Yu Kong, Tianlong Chen, Huan Liu | Published: 2024-02-20 | Updated: 2024-06-03 LLM SecurityClassification of Malicious ActorsAttack Method 2024.02.20 2025.05.27 Literature Database
Evading Data Contamination Detection for Language Models is (too) Easy Authors: Jasper Dekoninck, Mark Niklas Müller, Maximilian Baader, Marc Fischer, Martin Vechev | Published: 2024-02-05 | Updated: 2024-02-12 Data ObfuscationData Contamination DetectionClassification of Malicious Actors 2024.02.05 2025.05.27 Literature Database
Label Poisoning is All You Need Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29 Security AnalysisBackdoor AttackClassification of Malicious Actors 2023.10.29 2025.05.28 Literature Database
On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused? Authors: Hangfan Zhang, Zhimeng Guo, Huaisheng Zhu, Bochuan Cao, Lu Lin, Jinyuan Jia, Jinghui Chen, Dinghao Wu | Published: 2023-10-02 LLM Performance EvaluationPrompt InjectionClassification of Malicious Actors 2023.10.02 2025.05.28 Literature Database
Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning Authors: Estelle Ruellan, Masarah Paquet-Clouston, Sebastian Garcia | Published: 2023-08-30 Interpretation of Topic ModelsClassification of Malicious ActorsMachine Learning Technology 2023.08.30 2025.05.28 Literature Database
The GANfather: Controllable generation of malicious activity to improve defence systems Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25 CybersecurityData GenerationClassification of Malicious Actors 2023.07.25 2025.05.28 Literature Database
Malware Resistant Data Protection in Hyper-connected Networks: A survey Authors: Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam | Published: 2023-07-24 CybersecurityMalware Propagation MeansClassification of Malicious Actors 2023.07.24 2025.05.28 Literature Database
Early Malware Detection and Next-Action Prediction Authors: Zahra Jamadi, Amir G. Aghdam | Published: 2023-06-09 LSTM Model Performance EvaluationCyber AttackClassification of Malicious Actors 2023.06.09 2025.05.28 Literature Database
Backdoor Attacks in Peer-to-Peer Federated Learning Authors: Georgios Syros, Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea | Published: 2023-01-23 | Updated: 2024-09-17 Backdoor AttackPoisoningClassification of Malicious Actors 2023.01.23 2025.05.28 Literature Database