SecureNet: A Comparative Study of DeBERTa and Large Language Models for Phishing Detection Authors: Sakshi Mahendru, Tejul Pandit | Published: 2024-06-10 LLM Performance EvaluationPhishing DetectionPrompt Injection 2024.06.10 2025.05.27 Literature Database
A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications Authors: Aydin Zaboli, Seong Lok Choi, Tai-Jin Song, Junho Hong | Published: 2024-06-08 LLM Performance EvaluationCybersecurityAnomaly Detection Method 2024.06.08 2025.05.27 Literature Database
Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning Authors: Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Dayong Ye, Shui Yu, Wanlei Zhou | Published: 2024-06-06 LLM Performance EvaluationPrivacy ProtectionBlockchain Technology 2024.06.06 2025.05.27 Literature Database
AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens Authors: Lin Lu, Hai Yan, Zenghui Yuan, Jiawen Shi, Wenqi Wei, Pin-Yu Chen, Pan Zhou | Published: 2024-06-06 LLM Performance EvaluationPrompt InjectionDefense Method 2024.06.06 2025.05.27 Literature Database
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning Authors: Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin | Published: 2024-06-06 CVE Information ExtractionLLM Performance EvaluationVulnerability Management 2024.06.06 2025.05.27 Literature Database
Decoupled Alignment for Robust Plug-and-Play Adaptation Authors: Haozheng Luo, Jiahao Yu, Wenxin Zhang, Jialong Li, Jerry Yao-Chieh Hu, Xinyu Xing, Han Liu | Published: 2024-06-03 | Updated: 2024-06-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models Authors: Jiaqi Xue, Mengxin Zheng, Yebowen Hu, Fei Liu, Xun Chen, Qian Lou | Published: 2024-06-03 | Updated: 2024-06-06 LLM Performance EvaluationQuery DiversityQuery Generation Method 2024.06.03 2025.05.27 Literature Database
$$\mathbf{L^2\cdot M = C^2}$$ Large Language Models are Covert Channels Authors: Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom | Published: 2024-05-24 | Updated: 2024-10-07 LLM Performance EvaluationWatermarkingSecure Communication Channel 2024.05.24 2025.05.27 Literature Database
Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study Authors: Karl Tamberg, Hayretdin Bahsi | Published: 2024-05-24 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.05.24 2025.05.27 Literature Database
Evaluation of the Programming Skills of Large Language Models Authors: Luc Bryan Heitz, Joun Chamas, Christopher Scherb | Published: 2024-05-23 LLM Performance EvaluationCode GenerationData Collection 2024.05.23 2025.05.27 Literature Database