| |
| Applications of Large Language Models Technology for Threat Intelligence: A Survey |
| | CUI Mengjiao, JIANG Zhengwei, CHEN Yiren, JIANG Jun, ZHANG Kai, LING Zhiting, FENG Huamin, YANG Peian |
| | Published September 18, 2024 |
| | 2024,9(5):1-25 [Abstract] [View PDF(1.24 M)] |
| | |
| Challenges and Opportunities of Large Language Model Security |
| | FU Zhiyuan, CHEN Siyu, CHEN Junfan, HAI Xiang, SHI Yansong, LI Xiaoqi, LI Yihong, YUE Qiuling, ZHANG Yuqing |
| | Published September 18, 2024 |
| | 2024,9(5):26-55 [Abstract] [View PDF(2.58 M)] |
| | |
| A Review of Jailbreak Attacks and Defenses for Large Language Models |
| | LIANG Siyuan, HE Yingzhe, LIU Aishan, LI Jingzhi, DAI Pengwen, CAO Xiaochun |
| | Published September 18, 2024 |
| | 2024,9(5):56-86 [Abstract] [View PDF(11.32 M)] |
| | |
| A Review of Security Research in the Development Stage of Software Supply Chain Enhanced by Large Models |
| | LIU Jingqiang, TIAN Xing, SHU Yuqi, ZHU Xiaoxi, LIU Yuling, LIU Qixu |
| | Published September 18, 2024 |
| | 2024,9(5):87-109 [Abstract] [View PDF(1.33 M)] |
| | |
| Malware Detection and Classification Based on API Block Reconstruction and Image Representation |
| | YANG Hongyu, ZHANG Yupei, ZHANG Liang, CHENG Xiang |
| | Published September 18, 2024 |
| | 2024,9(5):110-126 [Abstract] [View PDF(4.24 M)] |
| | |
| Robust Watermarking for Protect Transformer Intellectual Property |
| | WANG Baowei, ZHENG Weiqian |
| | Published September 18, 2024 |
| | 2024,9(5):127-138 [Abstract] [View PDF(893.69 K)] |
| | |
| A Survey on Image Visualization Approaches-based Malware Classification Techniques |
| | QIAN Liping, WANG Dawei |
| | Published September 18, 2024 |
| | 2024,9(5):139-161 [Abstract] [View PDF(2.05 M)] |
| | |
| Android Malware Detection Based on Multi-view Representation Learning |
| | ZHAO Wenxiang, MENG Zhaoyi, XIONG Yan, HUANG Wenchao |
| | Published September 18, 2024 |
| | 2024,9(5):162-177 [Abstract] [View PDF(1.46 M)] |
| | |
| A Certificateless Subgroup Multi-Signature Scheme |
| | WANG Yuhang, XU Zheqing, WANG Zhiwei, LIU Feng |
| | Published September 18, 2024 |
| | 2024,9(5):178-188 [Abstract] [View PDF(558.62 K)] |
| | |
| A Survey of Ethereum Illegal Detection Methods |
| | LI Meng, LIANG Guangjun, YIN Jie, MA Zhuo, ZHANG Yi |
| | Published September 18, 2024 |
| | 2024,9(5):189-216 [Abstract] [View PDF(2.01 M)] |
| | |
| Robust Image Encryption Based on Improved Logistic Chaos and Cross-Chaos Diffusion |
| | GUO Yuan, JIA Debao, WANG Chong, ZHAI Ping |
| | Published September 18, 2024 |
| | 2024,9(5):217-228 [Abstract] [View PDF(14.98 M)] |
| | |
| Malicious Domain Names Detection Methods Analysis: A Survey |
| | WANG Qing, HAN Dongxu, LU Zhigang, JIANG Bo, DONG Cong, LIU Junrong, SHI Wenchang, LIU Yuling |
| | Published September 18, 2024 |
| | 2024,9(5):229-249 [Abstract] [View PDF(832.75 K)] |
| | |