Automatic Pseudo-Harmful Prompt Generation for Evaluating False Refusals in Large Language Models Authors: Bang An, Sicheng Zhu, Ruiyi Zhang, Michael-Andrei Panaitescu-Liess, Yuancheng Xu, Furong Huang | Published: 2024-09-01 LLM Performance EvaluationContent ModerationPrompt Injection 2024.09.01 2025.05.27 Literature Database
LeCov: Multi-level Testing Criteria for Large Language Models Authors: Xuan Xie, Jiayang Song, Yuheng Huang, Da Song, Fuyuan Zhang, Felix Juefei-Xu, Lei Ma | Published: 2024-08-20 LLM Performance EvaluationTest PrioritizationPrompt Injection 2024.08.20 2025.05.27 Literature Database
Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05 LLM Performance EvaluationPrivacy Protection MethodEvaluation Method 2024.08.20 2025.05.27 Literature Database
Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.08.12 2025.05.27 Literature Database
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12 LLM Performance EvaluationRAGCybersecurity 2024.08.12 2025.05.27 Literature Database
Multimodal Large Language Models for Phishing Webpage Detection and Identification Authors: Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran | Published: 2024-08-12 LLM Performance EvaluationPhishing DetectionPrompt Injection 2024.08.12 2025.05.27 Literature Database
AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09 LLM Performance EvaluationCybersecurityPrompt Injection 2024.08.09 2025.05.27 Literature Database
Towards Explainable Network Intrusion Detection using Large Language Models Authors: Paul R. B. Houssel, Priyanka Singh, Siamak Layeghy, Marius Portmann | Published: 2024-08-08 LLM Performance EvaluationNetwork Threat DetectionPrompt Injection 2024.08.08 2025.05.27 Literature Database
MPC-Minimized Secure LLM Inference Authors: Deevashwer Rathee, Dacheng Li, Ion Stoica, Hao Zhang, Raluca Popa | Published: 2024-08-07 LLM Performance EvaluationMPC AlgorithmModel Performance Evaluation 2024.08.07 2025.05.27 Literature Database
Harnessing the Power of LLMs in Source Code Vulnerability Detection Authors: Andrew A Mahyari | Published: 2024-08-07 LLM Performance EvaluationProgram AnalysisVulnerability Management 2024.08.07 2025.05.27 Literature Database