MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers

Authors: Robert J. Joyce, Edward Raff, Charles Nicholas, James Holt | Published: 2023-10-18

IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-10-17

The Efficacy of Transformer-based Adversarial Attacks in Security Domains

Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17

Self-RAG: Learning to Retrieve, Generate, and Critique through Self-Reflection

Authors: Akari Asai, Zeqiu Wu, Yizhong Wang, Avirup Sil, Hannaneh Hajishirzi | Published: 2023-10-17

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Authors: Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem | Published: 2023-10-17

Privacy-Preserving Graph Embedding based on Local Differential Privacy

Authors: Zening Li, Rong-Hua Li, Meihao Liao, Fusheng Jin, Guoren Wang | Published: 2023-10-17 | Updated: 2024-08-04

Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks

Authors: Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh | Published: 2023-10-16

Regularization properties of adversarially-trained linear regression

Authors: Antônio H. Ribeiro, Dave Zachariah, Francis Bach, Thomas B. Schön | Published: 2023-10-16

Demystifying Poisoning Backdoor Attacks from a Statistical Perspective

Authors: Ganghua Wang, Xun Xian, Jayanth Srinivasa, Ashish Kundu, Xuan Bi, Mingyi Hong, Jie Ding | Published: 2023-10-16 | Updated: 2023-10-18

A Comprehensive Study of Privacy Risks in Curriculum Learning

Authors: Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li | Published: 2023-10-16