ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System

Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13

Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning

Authors: Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu | Published: 2024-02-13

Data Reconstruction Attacks and Defenses: A Systematic Evaluation

Authors: Sheng Liu, Zihan Wang, Yuxiao Chen, Qi Lei | Published: 2024-02-13 | Updated: 2025-03-22

CycPUF: Cyclic Physical Unclonable Function

Authors: Michael Dominguez, Amin Rezaei | Published: 2024-02-12

Locality Sensitive Hashing for Network Traffic Fingerprinting

Authors: Nowfel Mashnoor, Jay Thom, Abdur Rouf, Shamik Sengupta, Batyr Charyyev | Published: 2024-02-12

Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector

Authors: He Shuang, Lianying Zhao, David Lie | Published: 2024-02-12 | Updated: 2024-09-12

PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models

Authors: Wei Zou, Runpeng Geng, Binghui Wang, Jinyuan Jia | Published: 2024-02-12 | Updated: 2024-08-13

Integrating MLSecOps in the Biotechnology Industry 5.0

Authors: Naseela Pervez, Alexander J. Titus | Published: 2024-02-12

CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge

Authors: Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamas Bisztray, Merouane Debbah | Published: 2024-02-12 | Updated: 2024-06-03

ACW: Enhancing Traceability of AI-Generated Codes Based on Watermarking

Authors: Boquan Li, Mengdi Zhang, Peixin Zhang, Jun Sun, Xingmei Wang, Zirui Fu | Published: 2024-02-12 | Updated: 2024-08-21