SAGE-RT: Synthetic Alignment data Generation for Safety Evaluation and Red Teaming

Authors: Anurakt Kumar, Divyanshu Kumar, Jatan Loya, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2024-08-14

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions

Authors: Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun | Published: 2024-08-14

FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method

Authors: Shihua Sun, Pragya Sharma, Kenechukwu Nwodo, Angelos Stavrou, Haining Wang | Published: 2024-08-13

Casper: Prompt Sanitization for Protecting User Privacy in Web-Based Large Language Models

Authors: Chun Jie Chong, Chenxi Hou, Zhihao Yao, Seyed Mohammadjavad Seyed Talebi | Published: 2024-08-13

Fooling SHAP with Output Shuffling Attacks

Authors: Jun Yuan, Aritra Dasgupta | Published: 2024-08-12

Privacy in Federated Learning

Authors: Jaydip Sen, Hetvi Waghela, Sneha Rakshit | Published: 2024-08-12

Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study

Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12

A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution

Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12

Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption

Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12

Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection

Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12