Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05 LLM Performance EvaluationPrivacy Protection MethodEvaluation Method 2024.08.20 2025.05.27 Literature Database
Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.08.12 2025.05.27 Literature Database
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12 LLM Performance EvaluationRAGCybersecurity 2024.08.12 2025.05.27 Literature Database
Multimodal Large Language Models for Phishing Webpage Detection and Identification Authors: Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran | Published: 2024-08-12 LLM Performance EvaluationPhishing DetectionPrompt Injection 2024.08.12 2025.05.27 Literature Database
AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09 LLM Performance EvaluationCybersecurityPrompt Injection 2024.08.09 2025.05.27 Literature Database
Towards Explainable Network Intrusion Detection using Large Language Models Authors: Paul R. B. Houssel, Priyanka Singh, Siamak Layeghy, Marius Portmann | Published: 2024-08-08 LLM Performance EvaluationNetwork Threat DetectionPrompt Injection 2024.08.08 2025.05.27 Literature Database
MPC-Minimized Secure LLM Inference Authors: Deevashwer Rathee, Dacheng Li, Ion Stoica, Hao Zhang, Raluca Popa | Published: 2024-08-07 LLM Performance EvaluationMPC AlgorithmModel Performance Evaluation 2024.08.07 2025.05.27 Literature Database
Harnessing the Power of LLMs in Source Code Vulnerability Detection Authors: Andrew A Mahyari | Published: 2024-08-07 LLM Performance EvaluationProgram AnalysisVulnerability Management 2024.08.07 2025.05.27 Literature Database
The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums Authors: Vanessa Clairoux-Trepanier, Isa-May Beauchamp, Estelle Ruellan, Masarah Paquet-Clouston, Serge-Olivier Paquette, Eric Clay | Published: 2024-08-06 | Updated: 2024-10-01 LLM Performance EvaluationData CollectionVariable Extraction Method 2024.08.06 2025.05.27 Literature Database
Hide and Seek: Fingerprinting Large Language Models with Evolutionary Learning Authors: Dmitri Iourovitski, Sanat Sharma, Rakshak Talwar | Published: 2024-08-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.08.06 2025.05.27 Literature Database