Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23 Prompt InjectionModel ArchitectureLarge Language Model 2025.06.23 2025.06.25 Literature Database
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23 Model ArchitectureCertified RobustnessAdversarial Attack Analysis 2025.06.23 2025.06.25 Literature Database
JavelinGuard: Low-Cost Transformer Architectures for LLM Security Authors: Yash Datta, Sharath Rajasekar | Published: 2025-06-09 Privacy Enhancing TechnologyPrompt InjectionModel Architecture 2025.06.09 2025.06.11 Literature Database
On Large Language Models’ Hallucination with Regard to Known Facts Authors: Che Jiang, Biqing Qi, Xiangyu Hong, Dayuan Fu, Yang Cheng, Fandong Meng, Mo Yu, Bowen Zhou, Jie Zhou | Published: 2024-03-29 | Updated: 2024-10-28 HallucinationDetection of HallucinationsModel Architecture 2024.03.29 2025.05.27 Literature Database
Self-Rewarding Language Models Authors: Weizhe Yuan, Richard Yuanzhe Pang, Kyunghyun Cho, Xian Li, Sainbayar Sukhbaatar, Jing Xu, Jason Weston | Published: 2024-01-18 | Updated: 2024-02-08 AlignmentModel ArchitectureDeep Learning 2024.01.18 2025.05.27 Literature Database
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification Authors: Xuemei Li, Huirong Fu | Published: 2023-11-19 Training ProtocolModel ArchitectureIntrusion Detection System 2023.11.19 2025.05.28 Literature Database
FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework Authors: Sheldon C. Ebron Jr., Kan Yang | Published: 2023-11-17 Model ArchitectureAttack MethodEvaluation Method 2023.11.17 2025.05.28 Literature Database
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12 Privacy AnalysisMembership InferenceModel Architecture 2023.06.08 2025.05.28 Literature Database
Deep Learning model integrity checking mechanism using watermarking technique Authors: Shahinul Hoque, Farhin Farhad Riya, Yingyuan Yang, Jinyuan Sun | Published: 2023-01-29 | Updated: 2025-03-21 DNN IP Protection MethodWatermarkingModel Architecture 2023.01.29 2025.05.28 Literature Database
Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data Authors: Leijie Zhang, Ye Shi, Yu-Cheng Chang, Chin-Teng Lin | Published: 2022-09-18 AlgorithmModel ArchitectureHierarchical Classification Methods 2022.09.18 2025.05.28 Literature Database