The Role of Transformer Models in Advancing Blockchain Technology: A Systematic Survey

Authors: Tianxu Liu, Yanbin Wang, Jianguo Sun, Ye Tian, Yanyu Huang, Tao Xue, Peiyue Li, Yiwei Liu | Published: 2024-09-02 | Updated: 2024-09-05

Membership Inference Attacks Against In-Context Learning

Authors: Rui Wen, Zheng Li, Michael Backes, Yang Zhang | Published: 2024-09-02

Poster: Developing an O-RAN Security Test Lab

Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02

Defending against Model Inversion Attacks via Random Erasing

Authors: Viet-Hung Tran, Ngoc-Bao Nguyen, Son T. Mai, Hans Vandierendonck, Ngai-man Cheung | Published: 2024-09-02

Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack

Authors: Guanzhong Chen, Zhenghan Qin, Mingxin Yang, Yajie Zhou, Tao Fan, Tianyu Du, Zenglin Xu | Published: 2024-09-02 | Updated: 2024-09-04

ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model

Authors: Dawei Wang, Geng Zhou, Li Chen, Dan Li, Yukai Miao | Published: 2024-09-02

NoPhish: Efficient Chrome Extension for Phishing Detection Using Machine Learning Techniques

Authors: Leand Thaqi, Arbnor Halili, Kamer Vishi, Blerim Rexha | Published: 2024-09-01

A Novel Self-Attention-Enabled Weighted Ensemble-Based Convolutional Neural Network Framework for Distributed Denial of Service Attack Classification

Authors: Kanthimathi S, Shravan Venkatraman, Jayasankar K S, Pranay Jiljith T, Jashwanth R | Published: 2024-09-01 | Updated: 2024-10-12

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints

Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01

The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs

Authors: Bocheng Chen, Hanqing Guo, Guangjing Wang, Yuanda Wang, Qiben Yan | Published: 2024-09-01