What is in Your Safe Data? Identifying Benign Data that Breaks Safety

Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20

Can LLMs get help from other LLMs without revealing private information?

Authors: Florian Hartmann, Duc-Hieu Tran, Peter Kairouz, Victor Cărbune, Blaise Aguera y Arcas | Published: 2024-04-01 | Updated: 2024-04-02

On Large Language Models’ Hallucination with Regard to Known Facts

Authors: Che Jiang, Biqing Qi, Xiangyu Hong, Dayuan Fu, Yang Cheng, Fandong Meng, Mo Yu, Bowen Zhou, Jie Zhou | Published: 2024-03-29 | Updated: 2024-10-28

A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks

Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07

Detecting Financial Bots on the Ethereum Blockchain

Authors: Thomas Niedermayer, Pietro Saggese, Bernhard Haslhofer | Published: 2024-03-28 | Updated: 2025-01-02

Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications

Authors: Fouad Trad, Ali Chehab | Published: 2024-03-26 | Updated: 2024-06-10

To Err is Machine: Vulnerability Detection Challenges LLM Reasoning

Authors: Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Hengbo Tong, Swarna Das, Earl T. Barr, Wei Le | Published: 2024-03-25 | Updated: 2025-01-07

Deciphering the Interplay between Local Differential Privacy, Average Bayesian Privacy, and Maximum Bayesian Privacy

Authors: Xiaojin Zhang, Yulin Fei, Wei Chen | Published: 2024-03-25 | Updated: 2024-04-02

Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training

Authors: Shuai Zhao, Linchao Zhu, Ruijie Quan, Yi Yang | Published: 2024-03-23 | Updated: 2024-08-12

Large Language Models for Blockchain Security: A Systematic Literature Review

Authors: Zheyuan He, Zihao Li, Sen Yang, He Ye, Ao Qiao, Xiaosong Zhang, Xiapu Luo, Ting Chen | Published: 2024-03-21 | Updated: 2025-03-24