Knowledge Extraction Method

Instantiating Standards: Enabling Standard-Driven Text TTP Extraction with Evolvable Memory

Authors: Cheng Meng, ZhengWei Jiang, QiuYun Wang, XinYi Li, ChunYan Ma, FangMing Dong, FangLi Ren, BaoXu Liu | Published: 2025-05-14
Prompt leaking
Attack Detection Method
Knowledge Extraction Method

LLMs Perform Poorly at Concept Extraction in Cyber-security Research Literature

Authors: Maxime Würsch, Andrei Kucharavy, Dimitri Percia David, Alain Mermoud | Published: 2023-12-12
LLM Performance Evaluation
Data Preprocessing
Knowledge Extraction Method

Beyond Labeling Oracles: What does it mean to steal ML models?

Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13
Data Collection
Knowledge Extraction Method
evaluation metrics

Generate rather than Retrieve: Large Language Models are Strong Context Generators

Authors: Wenhao Yu, Dan Iter, Shuohang Wang, Yichong Xu, Mingxuan Ju, Soumya Sanyal, Chenguang Zhu, Michael Zeng, Meng Jiang | Published: 2022-09-21 | Updated: 2023-01-25
RAG
Data Generation Method
Knowledge Extraction Method

Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks

Authors: Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich Küttler, Mike Lewis, Wen-tau Yih, Tim Rocktäschel, Sebastian Riedel, Douwe Kiela | Published: 2020-05-22 | Updated: 2021-04-12
RAG
Information Extraction Method
Knowledge Extraction Method

REALM: Retrieval-Augmented Language Model Pre-Training

Authors: Kelvin Guu, Kenton Lee, Zora Tung, Panupong Pasupat, Ming-Wei Chang | Published: 2020-02-10
RAG
Data Generation Method
Knowledge Extraction Method

The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks

Authors: Yuheng Zhang, Ruoxi Jia, Hengzhi Pei, Wenxiao Wang, Bo Li, Dawn Song | Published: 2019-11-17 | Updated: 2020-04-18
Privacy Violation
Reconstruction Attack
Knowledge Extraction Method

Cognitive Techniques for Early Detection of Cybersecurity Events

Authors: Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi, Tim Finin | Published: 2018-08-01
Cyber Threat Intelligence
Attack Scenario Analysis
Knowledge Extraction Method

SPARK: Static Program Analysis Reasoning and Retrieving Knowledge

Authors: Wasuwee Sodsong, Bernhard Scholz, Sanjay Chawla | Published: 2017-11-03
Security Analysis Method
Machine Learning
Knowledge Extraction Method