WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs Authors: Hongbo Chen, Yifan Zhang, Xing Han, Huanyao Rong, Yuheng Zhang, Tianhao Mao, Hang Zhang, XiaoFeng Wang, Luyi Xing, Xun Chen | Published: 2024-05-02 2024.05.02 2025.04.03 文献データベース
Boosting Jailbreak Attack with Momentum Authors: Yihao Zhang, Zeming Wei | Published: 2024-05-02 2024.05.02 2025.04.03 文献データベース
DLAP: A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection Authors: Yanjing Yang, Xin Zhou, Runfeng Mao, Jinwei Xu, Lanxin Yang, Yu Zhangm, Haifeng Shen, He Zhang | Published: 2024-05-02 2024.05.02 2025.04.03 文献データベース
Boosting Communication Efficiency of Federated Learning’s Secure Aggregation Authors: Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Albert Y. Zomaya, Ralph Holz | Published: 2024-05-02 2024.05.02 2025.04.03 文献データベース
LLM Security Guard for Code Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari | Published: 2024-05-02 | Updated: 2024-05-03 2024.05.02 2025.04.03 文献データベース
PackVFL: Efficient HE Packing for Vertical Federated Learning Authors: Liu Yang, Shuowei Cai, Di Chai, Junxue Zhang, Han Tian, Yilun Jin, Kun Guo, Kai Chen, Qiang Yang | Published: 2024-05-01 2024.05.01 2025.04.03 文献データベース
Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation Authors: Haiyang Wei, Ligeng Chen, Zhengjie Du, Yuhan Wu, Haohui Huang, Yue Liu, Guang Cheng, Fengyuan Xu, Linzhang Wang, Bing Mao | Published: 2024-05-01 | Updated: 2025-03-27 2024.05.01 2025.04.03 文献データベース
TuBA: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning Authors: Xuanli He, Jun Wang, Qiongkai Xu, Pasquale Minervini, Pontus Stenetorp, Benjamin I. P. Rubinstein, Trevor Cohn | Published: 2024-04-30 | Updated: 2025-03-17 2024.04.30 2025.04.03 文献データベース
Federated Graph Learning for EV Charging Demand Forecasting with Personalization Against Cyberattacks Authors: Yi Li, Renyou Xie, Chaojie Li, Yi Wang, Zhaoyang Dong | Published: 2024-04-30 2024.04.30 2025.04.03 文献データベース
Why You Should Not Trust Interpretations in Machine Learning: Adversarial Attacks on Partial Dependence Plots Authors: Xi Xin, Giles Hooker, Fei Huang | Published: 2024-04-29 | Updated: 2024-05-01 2024.04.29 2025.04.03 文献データベース