Tree of Attacks: Jailbreaking Black-Box LLMs Automatically Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31 2023.12.04 2025.04.03 文献データベース
Intrusion Detection System with Machine Learning and Multiple Datasets Authors: Haiyan Xuan, Mohith Manohar | Published: 2023-12-04 2023.12.04 2025.04.03 文献データベース
Rethinking PGD Attack: Is Sign Function Necessary? Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21 2023.12.03 2025.04.03 文献データベース
Breaking XOR Arbiter PUFs without Reliability Information Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03 2023.12.03 2025.04.03 文献データベース
FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02 2023.12.02 2025.04.03 文献データベース
Malicious code detection in android: the role of sequence characteristics and disassembling methods Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02 2023.12.02 2025.04.03 文献データベース
Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01 2023.12.01 2025.04.03 文献データベース
Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05 2023.12.01 2025.04.03 文献データベース
TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features Authors: Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang | Published: 2023-12-01 | Updated: 2025-03-21 2023.12.01 2025.04.03 文献データベース
MalDicom: A Memory Forensic Framework for Detecting Malicious Payload in DICOM Files Authors: Ayushi Mishra, Priyanka Bagade | Published: 2023-12-01 | Updated: 2023-12-08 2023.12.01 2025.04.03 文献データベース