Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection Authors: Han Zhang, Akram Bin Sediq, Ali Afana, Melike Erol-Kantarci | Published: 2024-05-17 Few-Shot LearningLLM Performance EvaluationAutomated Intrusion Detection System 2024.05.17 2025.05.27 Literature Database
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez | Published: 2024-05-15 LLM Performance EvaluationData PreprocessingMalware Classification 2024.05.15 2025.05.27 Literature Database
Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography Authors: Minhao Bai. Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang | Published: 2024-05-15 LLM Performance EvaluationDomain IndependenceWatermark Evaluation 2024.05.15 2025.05.27 Literature Database
DoLLM: How Large Language Models Understanding Network Flow Data to Detect Carpet Bombing DDoS Authors: Qingyang Li, Yihang Zhang, Zhidong Jia, Yannan Hu, Lei Zhang, Jianrong Zhang, Yongming Xu, Yong Cui, Zongming Guo, Xinggong Zhang | Published: 2024-05-13 DDoS Attack DetectionLLM Performance EvaluationModel Performance Evaluation 2024.05.13 2025.05.27 Literature Database
Oedipus: LLM-enchanced Reasoning CAPTCHA Solver Authors: Gelei Deng, Haoran Ou, Yi Liu, Jie Zhang, Tianwei Zhang, Yang Liu | Published: 2024-05-13 CAPTCHA SolverLLM Performance EvaluationPrompt Injection 2024.05.13 2025.05.27 Literature Database
PLeak: Prompt Leaking Attacks against Large Language Model Applications Authors: Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao | Published: 2024-05-10 | Updated: 2024-05-14 LLM Performance EvaluationPrompt InjectionMembership Inference 2024.05.10 2025.05.27 Literature Database
Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Sun | Published: 2024-05-10 | Updated: 2025-04-21 LLM Performance EvaluationIndirect Prompt InjectionAttack Detection 2024.05.10 2025.05.27 Literature Database
SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence Authors: Hangyuan Ji, Jian Yang, Linzheng Chai, Chaoren Wei, Liqun Yang, Yunlong Duan, Yunli Wang, Tianzhen Sun, Hongcheng Guo, Tongliang Li, Changyu Ren, Zhoujun Li | Published: 2024-05-06 | Updated: 2024-06-03 LLM Performance EvaluationCybersecurityDataset Generation 2024.05.06 2025.05.27 Literature Database
WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs Authors: Hongbo Chen, Yifan Zhang, Xing Han, Huanyao Rong, Yuheng Zhang, Tianhao Mao, Hang Zhang, XiaoFeng Wang, Luyi Xing, Xun Chen | Published: 2024-05-02 LLM Performance EvaluationCode GenerationPrompt Injection 2024.05.02 2025.05.27 Literature Database
Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation Authors: Haiyang Wei, Ligeng Chen, Zhengjie Du, Yuhan Wu, Haohui Huang, Yue Liu, Guang Cheng, Fengyuan Xu, Linzhang Wang, Bing Mao | Published: 2024-05-01 | Updated: 2025-03-27 LLM Performance EvaluationPrompt InjectionState Transition Model 2024.05.01 2025.05.27 Literature Database