Automatic Pseudo-Harmful Prompt Generation for Evaluating False Refusals in Large Language Models Authors: Bang An, Sicheng Zhu, Ruiyi Zhang, Michael-Andrei Panaitescu-Liess, Yuancheng Xu, Furong Huang | Published: 2024-09-01 2024.09.01 2025.04.03 文献データベース
Enhancing Source Code Security with LLMs: Demystifying The Challenges and Generating Reliable Repairs Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Elias Bou-Harb, Peyman Najafirad | Published: 2024-09-01 2024.09.01 2025.04.03 文献データベース
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks Authors: Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao | Published: 2024-08-31 | Updated: 2024-09-04 2024.08.31 2025.04.03 文献データベース
AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN) Authors: Lorenzo Guerra, Linhan Xu, Paolo Bellavista, Thomas Chapuis, Guillaume Duc, Pavlo Mozharovskyi, Van-Tam Nguyen | Published: 2024-08-30 | Updated: 2024-09-05 2024.08.30 2025.04.03 文献データベース
Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection Authors: Sachin Shukla, Omid Mirzaei | Published: 2024-08-29 | Updated: 2024-09-04 2024.08.29 2025.04.03 文献データベース
Analyzing Inference Privacy Risks Through Gradients in Machine Learning Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley Malin, Ye Wang | Published: 2024-08-29 2024.08.29 2025.04.03 文献データベース
LLM Defenses Are Not Robust to Multi-Turn Human Jailbreaks Yet Authors: Nathaniel Li, Ziwen Han, Ian Steneker, Willow Primack, Riley Goodside, Hugh Zhang, Zifan Wang, Cristina Menghini, Summer Yue | Published: 2024-08-27 | Updated: 2024-09-04 2024.08.27 2025.04.03 文献データベース
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Authors: Niklas Risse, Marcel Böhme | Published: 2024-08-23 2024.08.23 2025.04.03 文献データベース
Obfuscated Memory Malware Detection Authors: Sharmila S P, Aruna Tiwari, Narendra S Chaudhari | Published: 2024-08-23 2024.08.23 2025.04.03 文献データベース
Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks Authors: Yusuf Usman, Aadesh Upadhyay, Prashnna Gyawali, Robin Chataut | Published: 2024-08-23 2024.08.23 2025.04.03 文献データベース