Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security Authors: Yihe Fan, Yuxin Cao, Ziyu Zhao, Ziyao Liu, Shaofeng Li | Published: 2024-04-08 | Updated: 2024-08-11 LLM SecurityPrompt InjectionThreat modeling 2024.04.08 2025.05.27 Literature Database
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems Authors: Francesco Marchiori, Mauro Conti | Published: 2024-04-06 Intrusion Detection SystemAdversarial TrainingThreat modeling 2024.04.06 2025.05.27 Literature Database
SunBlock: Cloudless Protection for IoT Systems Authors: Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David Choffnes, Hamed Haddadi | Published: 2024-01-25 Resource optimizationIoT Threat Detection in Home RoutersThreat modeling 2024.01.25 2025.05.27 Literature Database
ADMIn: Attacks on Dataset, Model and Input. A Threat Model for AI Based Software Authors: Vimal Kumar, Juliette Mayo, Khadija Bahiss | Published: 2024-01-15 Cyber AttackModel Performance EvaluationThreat modeling 2024.01.15 2025.05.27 Literature Database
Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01 Security AnalysisThreat modelingWatermark Robustness 2023.12.01 2025.05.28 Literature Database
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation Authors: Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde | Published: 2023-10-04 Data GenerationThreat modelingevaluation metrics 2023.10.04 2025.05.28 Literature Database
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02 WatermarkingSecurity AnalysisThreat modeling 2023.10.02 2025.05.28 Literature Database
Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán | Published: 2023-07-21 | Updated: 2023-12-09 Secure Communication ChannelPoisoningThreat modeling 2023.07.21 2025.05.28 Literature Database
A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17 Dataset GenerationMachine Learning TechnologyThreat modeling 2023.07.17 2025.05.28 Literature Database
Robust Ranking Explanations Authors: Chao Chen, Chenghua Guo, Guixiang Ma, Ming Zeng, Xi Zhang, Sihong Xie | Published: 2023-07-08 Robustness EvaluationThreat modelingExplainability 2023.07.08 2025.05.28 Literature Database