LLM Performance Evaluation

Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection

Authors: Han Zhang, Akram Bin Sediq, Ali Afana, Melike Erol-Kantarci | Published: 2024-05-17
Few-Shot Learning
LLM Performance Evaluation
Automated Intrusion Detection System

Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls

Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez | Published: 2024-05-15
LLM Performance Evaluation
Data Preprocessing
Malware Classification

Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography

Authors: Minhao Bai. Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang | Published: 2024-05-15
LLM Performance Evaluation
Domain Independence
Watermark Evaluation

DoLLM: How Large Language Models Understanding Network Flow Data to Detect Carpet Bombing DDoS

Authors: Qingyang Li, Yihang Zhang, Zhidong Jia, Yannan Hu, Lei Zhang, Jianrong Zhang, Yongming Xu, Yong Cui, Zongming Guo, Xinggong Zhang | Published: 2024-05-13
DDoS Attack Detection
LLM Performance Evaluation
Model Performance Evaluation

Oedipus: LLM-enchanced Reasoning CAPTCHA Solver

Authors: Gelei Deng, Haoran Ou, Yi Liu, Jie Zhang, Tianwei Zhang, Yang Liu | Published: 2024-05-13
CAPTCHA Solver
LLM Performance Evaluation
Prompt Injection

PLeak: Prompt Leaking Attacks against Large Language Model Applications

Authors: Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao | Published: 2024-05-10 | Updated: 2024-05-14
LLM Performance Evaluation
Prompt Injection
Membership Inference

Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation

Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Sun | Published: 2024-05-10 | Updated: 2025-04-21
LLM Performance Evaluation
Indirect Prompt Injection
Attack Detection

SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence

Authors: Hangyuan Ji, Jian Yang, Linzheng Chai, Chaoren Wei, Liqun Yang, Yunlong Duan, Yunli Wang, Tianzhen Sun, Hongcheng Guo, Tongliang Li, Changyu Ren, Zhoujun Li | Published: 2024-05-06 | Updated: 2024-06-03
LLM Performance Evaluation
Cybersecurity
Dataset Generation

WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs

Authors: Hongbo Chen, Yifan Zhang, Xing Han, Huanyao Rong, Yuheng Zhang, Tianhao Mao, Hang Zhang, XiaoFeng Wang, Luyi Xing, Xun Chen | Published: 2024-05-02
LLM Performance Evaluation
Code Generation
Prompt Injection

Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation

Authors: Haiyang Wei, Ligeng Chen, Zhengjie Du, Yuhan Wu, Haohui Huang, Yue Liu, Guang Cheng, Fengyuan Xu, Linzhang Wang, Bing Mao | Published: 2024-05-01 | Updated: 2025-03-27
LLM Performance Evaluation
Prompt Injection
State Transition Model