Employing LLMs for Incident Response Planning and Review Authors: Sam Hays, Jules White | Published: 2024-03-02 2024.03.02 2025.04.03 文献データベース
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach Authors: Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu | Published: 2024-03-02 2024.03.02 2025.04.03 文献データベース
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks Authors: Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li | Published: 2024-03-02 2024.03.02 2025.04.03 文献データベース
BasedAI: A decentralized P2P network for Zero Knowledge Large Language Models (ZK-LLMs) Authors: Sean Wellington | Published: 2024-03-01 2024.03.01 2025.04.03 文献データベース
Transfer Learning for Security: Challenges and Future Directions Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01 2024.03.01 2025.04.03 文献データベース
Differentially Private Knowledge Distillation via Synthetic Text Generation Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05 2024.03.01 2025.04.03 文献データベース
Attacking Delay-based PUFs with Minimal Adversary Model Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar | Published: 2024-03-01 2024.03.01 2025.04.03 文献データベース
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01 2024.03.01 2025.04.03 文献データベース
Teach LLMs to Phish: Stealing Private Information from Language Models Authors: Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal | Published: 2024-03-01 2024.03.01 2025.04.03 文献データベース
Shifted Interpolation for Differential Privacy Authors: Jinho Bok, Weijie Su, Jason M. Altschuler | Published: 2024-03-01 | Updated: 2024-06-12 2024.03.01 2025.04.03 文献データベース