On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains

Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding | Published: 2024-09-12

Harnessing TI Feeds for Exploitation Detection

Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12

HERL: Tiered Federated Learning with Adaptive Homomorphic Encryption using Reinforcement Learning

Authors: Jiaxang Tang, Zeshan Fayyaz, Mohammad A. Salahuddin, Raouf Boutaba, Zhi-Li Zhang, Ali Anwar | Published: 2024-09-11

Advancing Malicious Website Identification: A Machine Learning Approach Using Granular Feature Analysis

Authors: Kinh Tran, Dusan Sovilj | Published: 2024-09-11

Exploring LLMs for Malware Detection: Review, Framework Design, and Countermeasure Approaches

Authors: Jamal Al-Karaki, Muhammad Al-Zafar Khan, Marwan Omar | Published: 2024-09-11

SoK: Security and Privacy Risks of Medical AI

Authors: Yuanhaur Chang, Han Liu, Evin Jaff, Chenyang Lu, Ning Zhang | Published: 2024-09-11

CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification

Authors: Zeqing Qin, Yiwei Wu, Lansheng Han | Published: 2024-09-11

Revisiting Static Feature-Based Android Malware Detection

Authors: Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi | Published: 2024-09-11

DrLLM: Prompt-Enhanced Distributed Denial-of-Service Resistance Method with Large Language Models

Authors: Zhenyu Yin, Shang Liu, Guangyuan Xu | Published: 2024-09-11 | Updated: 2025-01-13

Exploring User-level Gradient Inversion with a Diffusion Prior

Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang | Published: 2024-09-11