BADTV: Unveiling Backdoor Threats in Third-Party Task Vectors

Authors: Chia-Yi Hsu, Yu-Lin Tsai, Yu Zhe, Yan-Lun Chen, Chih-Hsun Lin, Chia-Mu Yu, Yang Zhang, Chun-Ying Huang, Jun Sakuma | Published: 2025-01-04

GNSS/GPS Spoofing and Jamming Identification Using Machine Learning and Deep Learning

Authors: Ali Ghanbarzade, Hossein Soleimani | Published: 2025-01-04

Leveraging Large Language Models and Machine Learning for Smart Contract Vulnerability Detection

Authors: S M Mostaq Hossain, Amani Altarawneh, Jesse Roberts | Published: 2025-01-04

Towards Robust and Accurate Stability Estimation of Local Surrogate Models in Text-based Explainable AI

Authors: Christopher Burger, Charles Walter, Thai Le, Lingwei Chen | Published: 2025-01-03

Mingling with the Good to Backdoor Federated Learning

Authors: Nuno Neves | Published: 2025-01-03

Auto-RT: Automatic Jailbreak Strategy Exploration for Red-Teaming Large Language Models

Authors: Yanjiang Liu, Shuhen Zhou, Yaojie Lu, Huijia Zhu, Weiqiang Wang, Hongyu Lin, Ben He, Xianpei Han, Le Sun | Published: 2025-01-03

Practical Secure Inference Algorithm for Fine-tuned Large Language Model Based on Fully Homomorphic Encryption

Authors: Zhang Ruoyan, Zheng Zhongxiang, Bao Wankang | Published: 2025-01-03 | Updated: 2025-01-07

BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction

Authors: Alaeddine Diaf, Abdelaziz Amara Korba, Nour Elislem Karabadji, Yacine Ghamri-Doudane | Published: 2025-01-03

CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models

Authors: Johan Wahréus, Ahmed Mohamed Hussain, Panos Papadimitratos | Published: 2025-01-02

Safeguarding Large Language Models in Real-time with Tunable Safety-Performance Trade-offs

Authors: Joao Fonseca, Andrew Bell, Julia Stoyanovich | Published: 2025-01-02