Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare

Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19

Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention

Authors: Ellie Prosser, Matthew Edwards | Published: 2024-03-14

AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting

Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14

Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems

Authors: Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia | Published: 2024-03-14

What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky | Published: 2024-03-14

An Extensive Comparison of Static Application Security Testing Tools

Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14

A Decade’s Battle on Dataset Bias: Are We There Yet?

Authors: Zhuang Liu, Kaiming He | Published: 2024-03-13 | Updated: 2025-03-03

SAP: Corrective Machine Unlearning with Scaled Activation Projection for Label Noise Robustness

Authors: Sangamesh Kodge, Deepak Ravikumar, Gobinda Saha, Kaushik Roy | Published: 2024-03-13 | Updated: 2025-01-02

A Sophisticated Framework for the Accurate Detection of Phishing Websites

Authors: Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed | Published: 2024-03-13

SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks

Authors: Guy Amit, Abigail Goldsteen, Ariel Farkash | Published: 2024-03-13