Towards Explainable Network Intrusion Detection using Large Language Models Authors: Paul R. B. Houssel, Priyanka Singh, Siamak Layeghy, Marius Portmann | Published: 2024-08-08 2024.08.08 2025.04.03 文献データベース
AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair | Published: 2024-08-08 2024.08.08 2025.04.03 文献データベース
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding Authors: Jonggyu Jang, Hyeonsu Lyu, Seongjin Hwang, Hyun Jong Yang | Published: 2024-08-08 2024.08.08 2025.04.03 文献データベース
Zero-day attack and ransomware detection Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08 2024.08.08 2025.04.03 文献データベース
LaFA: Latent Feature Attacks on Non-negative Matrix Factorization Authors: Minh Vu, Ben Nebgen, Erik Skau, Geigh Zollicoffer, Juan Castorena, Kim Rasmussen, Boian Alexandrov, Manish Bhattarai | Published: 2024-08-07 2024.08.07 2025.04.03 文献データベース
EnJa: Ensemble Jailbreak on Large Language Models Authors: Jiahao Zhang, Zilong Wang, Ruofan Wang, Xingjun Ma, Yu-Gang Jiang | Published: 2024-08-07 2024.08.07 2025.04.03 文献データベース
MPC-Minimized Secure LLM Inference Authors: Deevashwer Rathee, Dacheng Li, Ion Stoica, Hao Zhang, Raluca Popa | Published: 2024-08-07 2024.08.07 2025.04.03 文献データベース
Harnessing the Power of LLMs in Source Code Vulnerability Detection Authors: Andrew A Mahyari | Published: 2024-08-07 2024.08.07 2025.04.03 文献データベース
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06 2024.08.06 2025.04.03 文献データベース
Malicious Internet Entity Detection Using Local Graph Inference Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07 2024.08.06 2025.04.03 文献データベース