Multimodal Large Language Models for Phishing Webpage Detection and Identification

Authors: Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran | Published: 2024-08-12

Fast John Ellipsoid Computation with Differential Privacy Optimization

Authors: Jiuxiang Gu, Xiaoyu Li, Yingyu Liang, Zhenmei Shi, Zhao Song, Junwei Yu | Published: 2024-08-12

Kov: Transferable and Naturalistic Black-Box LLM Attacks using Markov Decision Processes and Tree Search

Authors: Robert J. Moss | Published: 2024-08-11

Using Retriever Augmented Large Language Models for Attack Graph Generation

Authors: Renascence Tarafder Prapty, Ashish Kundu, Arun Iyengar | Published: 2024-08-11

PhishLang: A Lightweight, Client-Side Phishing Detection Framework using MobileBERT for Real-Time, Explainable Threat Mitigation

Authors: Sayak Saha Roy, Shirin Nilizadeh | Published: 2024-08-11 | Updated: 2024-09-09

Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning

Authors: William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore | Published: 2024-08-10

AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset

Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09

h4rm3l: A language for Composable Jailbreak Attack Synthesis

Authors: Moussa Koulako Bala Doumbouya, Ananjan Nandi, Gabriel Poesia, Davide Ghilardi, Anna Goldie, Federico Bianchi, Dan Jurafsky, Christopher D. Manning | Published: 2024-08-09 | Updated: 2025-03-25

Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era

Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08

The Role and Applications of Airport Digital Twin in Cyberattack Protection during the Generative AI Era

Authors: Abraham Itzhak Weinberg | Published: 2024-08-08