Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19 2024.03.14 2025.04.03 文献データベース
Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention Authors: Ellie Prosser, Matthew Edwards | Published: 2024-03-14 2024.03.14 2025.04.03 文献データベース
AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14 2024.03.14 2025.04.03 文献データベース
Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems Authors: Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia | Published: 2024-03-14 2024.03.14 2025.04.03 文献データベース
What Was Your Prompt? A Remote Keylogging Attack on AI Assistants Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky | Published: 2024-03-14 2024.03.14 2025.04.03 文献データベース
An Extensive Comparison of Static Application Security Testing Tools Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14 2024.03.14 2025.04.03 文献データベース
A Decade’s Battle on Dataset Bias: Are We There Yet? Authors: Zhuang Liu, Kaiming He | Published: 2024-03-13 | Updated: 2025-03-03 2024.03.13 2025.04.03 文献データベース
SAP: Corrective Machine Unlearning with Scaled Activation Projection for Label Noise Robustness Authors: Sangamesh Kodge, Deepak Ravikumar, Gobinda Saha, Kaushik Roy | Published: 2024-03-13 | Updated: 2025-01-02 2024.03.13 2025.04.03 文献データベース
A Sophisticated Framework for the Accurate Detection of Phishing Websites Authors: Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed | Published: 2024-03-13 2024.03.13 2025.04.03 文献データベース
SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks Authors: Guy Amit, Abigail Goldsteen, Ariel Farkash | Published: 2024-03-13 2024.03.13 2025.04.03 文献データベース