Dual-Path Phishing Detection: Integrating Transformer-Based NLP with Structural URL Analysis Authors: Ibrahim Altan, Abdulla Bachir, Yousuf Parbhulkar, Abdul Muksith Rizvi, Moshiur Farazi | Published: 2025-09-25 フィッシング攻撃の傾向Analysis of Detection MethodsNatural Language Processing 2025.09.25 2025.09.27 Literature Database
Evading Toxicity Detection with ASCII-art: A Benchmark of Spatial Attacks on Moderation Systems Authors: Sergey Berezin, Reza Farahbakhsh, Noel Crespi | Published: 2024-09-27 | Updated: 2025-09-24 Token Compression FrameworkPrompt leakingNatural Language Processing 2024.09.27 2025.09.26 Literature Database
Trojan Activation Attack: Red-Teaming Large Language Models using Activation Steering for Safety-Alignment Authors: Haoran Wang, Kai Shu | Published: 2023-11-15 | Updated: 2024-08-15 Prompt InjectionAttack MethodNatural Language Processing 2023.11.15 2025.05.28 Literature Database
Privately Aligning Language Models with Reinforcement Learning Authors: Fan Wu, Huseyin A. Inan, Arturs Backurs, Varun Chandrasekaran, Janardhan Kulkarni, Robert Sim | Published: 2023-10-25 | Updated: 2024-05-03 Privacy TechniqueModel DesignNatural Language Processing 2023.10.25 2025.05.28 Literature Database
Detecting Pretraining Data from Large Language Models Authors: Weijia Shi, Anirudh Ajith, Mengzhou Xia, Yangsibo Huang, Daogao Liu, Terra Blevins, Danqi Chen, Luke Zettlemoyer | Published: 2023-10-25 | Updated: 2024-03-09 Data GenerationNatural Language ProcessingCopyright Trap 2023.10.25 2025.05.28 Literature Database
Time Travel in LLMs: Tracing Data Contamination in Large Language Models Authors: Shahriar Golchin, Mihai Surdeanu | Published: 2023-08-16 | Updated: 2024-02-21 Data Contamination DetectionPrompt InjectionNatural Language Processing 2023.08.16 2025.05.28 Literature Database
Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08 Malware Detection MethodFeature Extraction MethodNatural Language Processing 2023.06.25 2025.05.28 Literature Database
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions Authors: Reza Fayyazi, Shanchieh Jay Yang | Published: 2023-06-24 | Updated: 2023-08-22 Prompt InjectionMalware ClassificationNatural Language Processing 2023.06.24 2025.05.28 Literature Database
Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare | Published: 2023-04-13 Security AnalysisDataset GenerationNatural Language Processing 2023.04.13 2025.05.28 Literature Database
Bayesian Attention Belief Networks Authors: Shujian Zhang, Xinjie Fan, Bo Chen, Mingyuan Zhou | Published: 2021-06-09 Natural Language ProcessingComputational EfficiencyEvaluation Method 2021.06.09 2025.05.28 Literature Database