Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning Authors: Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Dayong Ye, Shui Yu, Wanlei Zhou | Published: 2024-06-06 LLM Performance EvaluationPrivacy ProtectionBlockchain Technology 2024.06.06 2025.05.27 Literature Database
AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens Authors: Lin Lu, Hai Yan, Zenghui Yuan, Jiawen Shi, Wenqi Wei, Pin-Yu Chen, Pan Zhou | Published: 2024-06-06 LLM Performance EvaluationPrompt InjectionDefense Method 2024.06.06 2025.05.27 Literature Database
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning Authors: Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin | Published: 2024-06-06 CVE Information ExtractionLLM Performance EvaluationVulnerability Management 2024.06.06 2025.05.27 Literature Database
Decoupled Alignment for Robust Plug-and-Play Adaptation Authors: Haozheng Luo, Jiahao Yu, Wenxin Zhang, Jialong Li, Jerry Yao-Chieh Hu, Xinyu Xing, Han Liu | Published: 2024-06-03 | Updated: 2024-06-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models Authors: Jiaqi Xue, Mengxin Zheng, Yebowen Hu, Fei Liu, Xun Chen, Qian Lou | Published: 2024-06-03 | Updated: 2024-06-06 LLM Performance EvaluationQuery DiversityQuery Generation Method 2024.06.03 2025.05.27 Literature Database
$$\mathbf{L^2\cdot M = C^2}$$ Large Language Models are Covert Channels Authors: Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom | Published: 2024-05-24 | Updated: 2024-10-07 LLM Performance EvaluationWatermarkingSecure Communication Channel 2024.05.24 2025.05.27 Literature Database
Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study Authors: Karl Tamberg, Hayretdin Bahsi | Published: 2024-05-24 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.05.24 2025.05.27 Literature Database
Evaluation of the Programming Skills of Large Language Models Authors: Luc Bryan Heitz, Joun Chamas, Christopher Scherb | Published: 2024-05-23 LLM Performance EvaluationCode GenerationData Collection 2024.05.23 2025.05.27 Literature Database
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17 LLM Performance EvaluationCybersecurityPrompt Injection 2024.05.21 2025.05.27 Literature Database
Information Leakage from Embedding in Large Language Models Authors: Zhipeng Wan, Anda Cheng, Yinggui Wang, Lei Wang | Published: 2024-05-20 | Updated: 2024-05-22 LLM Performance EvaluationMembership InferenceModel Performance Evaluation 2024.05.20 2025.05.27 Literature Database