Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention Authors: Ellie Prosser, Matthew Edwards | Published: 2024-03-14 LLM Performance EvaluationOnline Safety AdvicePrompt Injection 2024.03.14 2025.05.27 Literature Database
AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14 Prompt InjectionStructural AttackDefense Method 2024.03.14 2025.05.27 Literature Database
CodeAttack: Revealing Safety Generalization Challenges of Large Language Models via Code Completion Authors: Qibing Ren, Chang Gao, Jing Shao, Junchi Yan, Xin Tan, Wai Lam, Lizhuang Ma | Published: 2024-03-12 | Updated: 2024-09-14 LLM SecurityCode GenerationPrompt Injection 2024.03.12 2025.05.27 Literature Database
ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts Authors: Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu | Published: 2024-03-11 | Updated: 2024-03-18 Smart ContractPrompt InjectionAutomated Vulnerability Remediation 2024.03.11 2025.05.27 Literature Database
DP-TabICL: In-Context Learning with Differentially Private Tabular Data Authors: Alycia N. Carey, Karuna Bhaila, Kennedy Edemacu, Xintao Wu | Published: 2024-03-08 Few-Shot LearningPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
On Protecting the Data Privacy of Large Language Models (LLMs): A Survey Authors: Biwei Yan, Kun Li, Minghui Xu, Yueyan Dong, Yue Zhang, Zhaochun Ren, Xiuzhen Cheng | Published: 2024-03-08 | Updated: 2024-03-14 Backdoor AttackPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz | Published: 2024-03-06 | Updated: 2025-05-13 Prompt InjectionMalware ClassificationFederated Learning 2024.03.06 2025.05.27 Literature Database
Catch’em all: Classification of Rare, Prominent, and Novel Malware Families Authors: Maksim E. Eren, Ryan Barron, Manish Bhattarai, Selma Wanna, Nicholas Solovyev, Kim Rasmussen, Boian S. Alexandrov, Charles Nicholas | Published: 2024-03-04 Class ImbalancePrompt InjectionMalware Classification 2024.03.04 2025.05.27 Literature Database
KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection Authors: Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Hoon Wei Lim, Bryan Hooi | Published: 2024-03-04 | Updated: 2024-06-15 Phishing DetectionBrand Recognition ProblemPrompt Injection 2024.03.04 2025.05.27 Literature Database
Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks Authors: Sayedeh Leila Noorbakhsh, Binghui Zhang, Yuan Hong, Binghui Wang | Published: 2024-03-04 Privacy Protection MethodPrompt InjectionMembership Inference 2024.03.04 2025.05.27 Literature Database