DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts Authors: Ismael Medeiros, Fausto Carvalho, Alexandre Ferreira, Rodrigo Bonifácio, Fabiano Cavalcanti Fernandes | Published: 2024-09-03 Smart ContractBlockchain TechnologyEvaluation Method 2024.09.03 2025.05.27 Literature Database
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01 PoisoningAdversarial ExampleEvaluation Method 2024.09.01 2025.05.27 Literature Database
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23 Security AnalysisVulnerability ManagementEvaluation Method 2024.08.23 2025.05.27 Literature Database
Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05 LLM Performance EvaluationPrivacy Protection MethodEvaluation Method 2024.08.20 2025.05.27 Literature Database
KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment Authors: Zongzong Wu, Fengxiao Tang, Ming Zhao, Yufeng Li | Published: 2024-08-15 CybersecurityDataset GenerationEvaluation Method 2024.08.15 2025.05.27 Literature Database
EnJa: Ensemble Jailbreak on Large Language Models Authors: Jiahao Zhang, Zilong Wang, Ruofan Wang, Xingjun Ma, Yu-Gang Jiang | Published: 2024-08-07 Prompt InjectionAttack MethodEvaluation Method 2024.08.07 2025.05.27 Literature Database
Malicious Internet Entity Detection Using Local Graph Inference Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07 AlgorithmGraph TransformationEvaluation Method 2024.08.06 2025.05.27 Literature Database
Practical Attacks against Black-box Code Completion Engines Authors: Slobodan Jenko, Jingxuan He, Niels Mündler, Mark Vero, Martin Vechev | Published: 2024-08-05 Attack MethodVulnerability ManagementEvaluation Method 2024.08.05 2025.05.27 Literature Database
A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks Authors: Charles Oredola, Adnan Ashraf | Published: 2024-08-02 SDN ArchitectureCybersecurityEvaluation Method 2024.08.02 2025.05.27 Literature Database
Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++ Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03 Deep Learning MethodVulnerability ManagementEvaluation Method 2024.07.24 2025.05.27 Literature Database