Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen | Published: 2024-05-18 Model Performance EvaluationEvaluation MethodWatermark Evaluation 2024.05.18 2025.05.27 Literature Database
A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection Authors: Raja Giryes, Lior Shafir, Avishai Wool | Published: 2024-05-12 DDoS Attack DetectionData PreprocessingEvaluation Method 2024.05.12 2025.05.27 Literature Database
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang | Published: 2024-05-08 CybersecurityThreat modelingEvaluation Method 2024.05.08 2025.05.27 Literature Database
Explainable Malware Detection with Tailored Logic Explained Networks Authors: Peter Anthony, Francesco Giannini, Michelangelo Diligenti, Martin Homola, Marco Gori, Stefan Balogh, Jan Mojzis | Published: 2024-05-05 Malware ClassificationModel InterpretabilityEvaluation Method 2024.05.05 2025.05.27 Literature Database
Chain of trust: Unraveling references among Common Criteria certified products Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas | Published: 2024-04-22 | Updated: 2024-08-19 Dependency Risk AssessmentEvaluation MethodWatermark Evaluation 2024.04.22 2025.05.27 Literature Database
JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models Authors: Yingchaojie Feng, Zhizhang Chen, Zhining Kang, Sijia Wang, Minfeng Zhu, Wei Zhang, Wei Chen | Published: 2024-04-12 LLM Performance EvaluationPrompt InjectionEvaluation Method 2024.04.12 2025.05.27 Literature Database
Rethinking How to Evaluate Language Model Jailbreak Authors: Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik | Published: 2024-04-09 | Updated: 2024-05-07 Prompt InjectionClassification of Malicious ActorsEvaluation Method 2024.04.09 2025.05.27 Literature Database
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson | Published: 2024-04-08 WatermarkingMalware ClassificationEvaluation Method 2024.04.08 2025.05.27 Literature Database
Contextual Chart Generation for Cyber Deception Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba | Published: 2024-04-07 Data PreprocessingModel DesignEvaluation Method 2024.04.07 2025.05.27 Literature Database
PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics Authors: Derui Zhu, Dingfan Chen, Qing Li, Zongxiong Chen, Lei Ma, Jens Grossklags, Mario Fritz | Published: 2024-04-06 LLM SecurityLLM Performance EvaluationEvaluation Method 2024.04.06 2025.05.27 Literature Database