Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection Authors: Fei Zuo, Junghwan Rhee, Yung Ryn Choe | Published: 2025-03-24 Cyber Threat IntelligencePrompt InjectionInformation Extraction 2025.03.24 2025.05.27 Literature Database
Pretraining Data Detection for Large Language Models: A Divergence-based Calibration Method Authors: Weichao Zhang, Ruqing Zhang, Jiafeng Guo, Maarten de Rijke, Yixing Fan, Xueqi Cheng | Published: 2024-09-23 | Updated: 2025-05-21 Disabling Safety Mechanisms of LLMModel Performance EvaluationInformation Extraction 2024.09.23 2025.05.27 Literature Database
Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14 Data Protection MethodPrivacy TechniqueInformation Extraction 2023.06.14 2025.05.28 Literature Database
Why Does ChatGPT Fall Short in Providing Truthful Answers? Authors: Shen Zheng, Jie Huang, Kevin Chen-Chuan Chang | Published: 2023-04-20 | Updated: 2023-12-03 HallucinationInformation ExtractionMusic Genre 2023.04.20 2025.05.28 Literature Database
StratLearner: Learning a Strategy for Misinformation Prevention in Social Networks Authors: Guangmo Tong | Published: 2020-09-29 Graph ConstructionInformation ExtractionOptimization Methods 2020.09.29 2025.05.28 Literature Database
HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis Authors: Chidimma Opara, Bo Wei, Yingke Chen | Published: 2019-08-28 | Updated: 2020-05-15 Text Extraction MethodInformation ExtractionMachine Learning Algorithm 2019.08.28 2025.05.28 Literature Database
A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams Authors: Avishek Bose, Vahid Behzadan, Carlos Aguirre, William H. Hsu | Published: 2019-07-12 Event RankingInformation ExtractionSocial Impact 2019.07.12 2025.05.28 Literature Database