Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation

Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Sun | Published: 2024-05-10 | Updated: 2025-04-21

Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning

Authors: Yujie Zhang, Neil Gong, Michael K. Reiter | Published: 2024-05-10 | Updated: 2024-09-09

Demystifying Behavior-Based Malware Detection at Endpoints

Authors: Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David Wagner, Tudor Dumitras | Published: 2024-05-09

Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security

Authors: Leroy Jacob Valencia | Published: 2024-05-09

Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness

Authors: Siyuan Li, Xi Lin, Yaju Liu, Jianhua Li | Published: 2024-05-09

LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots

Authors: Christoforos Vasilatos, Dunia J. Mahboobeh, Hithem Lamri, Manaar Alam, Michail Maniatakos | Published: 2024-05-09

Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems

Authors: Amin Aminifar, Matin Shokri, Amir Aminifar | Published: 2024-05-09 | Updated: 2024-09-13

Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM

Authors: Xikang Yang, Xuehai Tang, Songlin Hu, Jizhong Han | Published: 2024-05-09

TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans

Authors: Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel | Published: 2024-05-09

Model Inversion Robustness: Can Transfer Learning Help?

Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09