Jailbreaking Attack against Multimodal Large Language Model Authors: Zhenxing Niu, Haodong Ren, Xinbo Gao, Gang Hua, Rong Jin | Published: 2024-02-04 Prompt InjectionMalicious Content GenerationInformation Gathering Methods 2024.02.04 2025.05.27 Literature Database
LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing Authors: Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly | Published: 2023-10-10 Prompt InjectionInformation Gathering MethodsThreat Actor Support 2023.10.10 2025.05.28 Literature Database
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To! Authors: Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson | Published: 2023-10-05 Data CollectionPrompt InjectionInformation Gathering Methods 2023.10.05 2025.05.28 Literature Database
Maximal Information Leakage from Quantum Encoding of Classical Data Authors: Farhad Farokhi | Published: 2023-07-24 | Updated: 2024-01-02 Data Privacy AssessmentInformation Gathering MethodsQuantum Cryptography Technology 2023.07.24 2025.05.28 Literature Database
Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07 Automation of CybersecurityInformation Gathering MethodsVulnerability Management 2023.01.27 2025.05.28 Literature Database
Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu | Published: 2022-07-04 Review and InvestigationInformation Gathering MethodsDeception Detection 2022.07.04 2025.05.28 Literature Database
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28 Protocol ProcedureTrust Evaluation ModuleInformation Gathering Methods 2020.08.28 2025.05.28 Literature Database
Studying Ransomware Attacks Using Web Search Logs Authors: Chetan Bansal, Pantazis Deligiannis, Chandra Maddila, Nikitha Rao | Published: 2020-05-01 | Updated: 2020-05-23 User Behavior AnalysisRansomware AssessmentInformation Gathering Methods 2020.05.01 2025.05.28 Literature Database
Capacity Bounded Differential Privacy Authors: Kamalika Chaudhuri, Jacob Imola, Ashwin Machanavajjhala | Published: 2019-07-03 Privacy ProtectionInformation Gathering MethodsResearch Methodology 2019.07.03 2025.05.28 Literature Database
A Bayesian Hierarchical Model for Criminal Investigations Authors: F. O. Bunnin, J. Q. Smith | Published: 2019-07-03 | Updated: 2019-11-05 Task DesignData Extraction and AnalysisInformation Gathering Methods 2019.07.03 2025.05.28 Literature Database