Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM Authors: Xikang Yang, Xuehai Tang, Songlin Hu, Jizhong Han | Published: 2024-05-09 2024.05.09 2025.04.03 文献データベース
TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans Authors: Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel | Published: 2024-05-09 2024.05.09 2025.04.03 文献データベース
Model Inversion Robustness: Can Transfer Learning Help? Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09 2024.05.09 2025.04.03 文献データベース
Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models Authors: Yang Bai, Ge Pei, Jindong Gu, Yong Yang, Xingjun Ma | Published: 2024-05-09 | Updated: 2024-05-20 2024.05.09 2025.04.03 文献データベース
PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks Authors: Mohammed Hassanin, Marwa Keshk, Sara Salim, Majid Alsubaie, Dharmendra Sharma | Published: 2024-05-09 2024.05.09 2025.04.03 文献データベース
Analysis and prevention of AI-based phishing email attacks Authors: Chibuike Samuel Eze, Lior Shamir | Published: 2024-05-08 2024.05.08 2025.04.03 文献データベース
Model Reconstruction Using Counterfactual Explanations: A Perspective From Polytope Theory Authors: Pasan Dissanayake, Sanghamitra Dutta | Published: 2024-05-08 | Updated: 2024-11-05 2024.05.08 2025.04.03 文献データベース
Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities Authors: Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke | Published: 2024-05-08 2024.05.08 2025.04.03 文献データベース
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang | Published: 2024-05-08 2024.05.08 2025.04.03 文献データベース
Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums Authors: Felipe Moreno-Vera | Published: 2024-05-07 2024.05.07 2025.04.03 文献データベース