Network Attack Traffic Detection With Hybrid Quantum-Enhanced Convolution Neural Network Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-04-29 Performance Evaluation MethodAttack DetectionQuantum Framework 2025.04.29 2025.05.27 Literature Database
BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21 Prompt InjectionAttack DetectionWatermarking Technology 2025.04.18 2025.05.27 Literature Database
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28 RAGCalculation of Output HarmfulnessAttack Detection 2025.03.05 2025.05.27 Literature Database
Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Sun | Published: 2024-05-10 | Updated: 2025-04-21 LLM Performance EvaluationIndirect Prompt InjectionAttack Detection 2024.05.10 2025.05.27 Literature Database
A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference Authors: Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra | Published: 2023-03-31 | Updated: 2024-04-25 DNN IP Protection MethodAttack DetectionAdaptive Adversarial Training 2023.03.31 2025.05.28 Literature Database
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30 Attack DetectionFeature Importance AnalysisVulnerability detection 2022.08.30 2025.05.28 Literature Database
Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25 CybersecurityAttack DetectionMachine Learning 2022.08.25 2025.05.28 Literature Database
An anomaly detection approach for backdoored neural networks: face recognition as a case study Authors: Alexander Unnervik, Sébastien Marcel | Published: 2022-08-22 Backdoor AttackAttack DetectionFace Recognition System 2022.08.22 2025.05.28 Literature Database
Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning Authors: Kerem Ozfatura, Emre Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2022-08-21 | Updated: 2024-01-01 Byzantine ResiliencePoisoningAttack Detection 2022.08.21 2025.05.28 Literature Database
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset Authors: Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak | Published: 2022-08-20 | Updated: 2022-10-30 Training ProtocolAttack DetectionMachine Learning Technology 2022.08.20 2025.05.28 Literature Database