BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models

Authors: Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li | Published: 2024-01-20

LLM4Fuzz: Guided Fuzzing of Smart Contracts with Large Language Models

Authors: Chaofan Shou, Jing Liu, Doudou Lu, Koushik Sen | Published: 2024-01-20

Exploring Highly Quantised Neural Networks for Intrusion Detection in Automotive CAN

Authors: Shashwat Khandelwal, Shreejith Shanker | Published: 2024-01-19

The Surprising Harmfulness of Benign Overfitting for Adversarial Robustness

Authors: Yifan Hao, Tong Zhang | Published: 2024-01-19 | Updated: 2024-01-25

Real-Time Zero-Day Intrusion Detection System for Automotive Controller Area Network on FPGAs

Authors: Shashwat Khandelwal, Shreejith Shanker | Published: 2024-01-19

Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors

Authors: Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong | Published: 2024-01-19

A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs

Authors: Shashwat Khandelwal, Shreejith Shanker | Published: 2024-01-19

Deep Learning-based Embedded Intrusion Detection System for Automotive CAN

Authors: Shashwat Khandelwal, Eashan Wadhwa, Shreejith Shanker | Published: 2024-01-19

PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks

Authors: Ping Guo, Zhiyuan Yang, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-19

Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats

Authors: Chen Wu, Xi Li, Jiaqi Wang | Published: 2024-01-18 | Updated: 2024-04-02