Using LLMs for Security Advisory Investigations: How Far Are We? Authors: Bayu Fedra Abdullah, Yusuf Sulistyo Nugroho, Brittany Reid, Raula Gaikovina Kula, Kazumasa Shimari, Kenichi Matsumoto | Published: 2025-06-16 Advice ProvisionHallucinationPrompt leaking 2025.06.16 2025.06.18 Literature Database
A Chatbot for Information Security Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01 Abuse of AI ChatbotsAdvice ProvisionInformation Security 2020.12.01 2025.05.28 Literature Database
Adversarial Detection and Correction by Matching Prediction Distributions Authors: Giovanni Vacanti, Arnaud Van Looveren | Published: 2020-02-21 Advice ProvisionAdversarial TrainingDefense Method 2020.02.21 2025.05.28 Literature Database
Adversarial Attacks on Linear Contextual Bandits Authors: Evrard Garcelon, Baptiste Roziere, Laurent Meunier, Jean Tarbouriech, Olivier Teytaud, Alessandro Lazaric, Matteo Pirotta | Published: 2020-02-10 | Updated: 2020-10-23 Advice ProvisionRobustness EvaluationAdversarial attack 2020.02.10 2025.05.28 Literature Database