LLM Agents can Autonomously Hack Websites

Authors: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang | Published: 2024-02-06 | Updated: 2024-02-16

PAC-Bayesian Adversarially Robust Generalization Bounds for Graph Neural Network

Authors: Tan Sun, Junhong Lin | Published: 2024-02-06 | Updated: 2024-07-06

Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously

Authors: Yihan Wang, Yifan Zhu, Xiao-Shan Gao | Published: 2024-02-06

A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective

Authors: Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson | Published: 2024-02-06

Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol

Authors: Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García, Carmen Benavides | Published: 2024-02-05

Homograph Attacks on Maghreb Sentiment Analyzers

Authors: Fatima Zahra Qachfar, Rakesh M. Verma | Published: 2024-02-05

Detecting Scams Using Large Language Models

Authors: Liming Jiang | Published: 2024-02-05

Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models

Authors: Junjie Chu, Zeyang Sha, Michael Backes, Yang Zhang | Published: 2024-02-05 | Updated: 2024-10-07

Unraveling the Key of Machine Learning Solutions for Android Malware Detection

Authors: Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang | Published: 2024-02-05

Dynamic Byzantine-Robust Learning: Adapting to Switching Byzantine Workers

Authors: Ron Dorfman, Naseem Yehya, Kfir Y. Levy | Published: 2024-02-05 | Updated: 2024-06-16