| |
| Applications of Large Language Models Technology for Threat Intelligence: A Survey |
| CUI Mengjiao, JIANG Zhengwei, CHEN Yiren, JIANG Jun, ZHANG Kai, LING Zhiting, FENG Huamin, YANG Peian |
| Published September 18, 2024 |
| 2024,9(5):1-25 [Abstract] [View PDF(1.24 M)] |
| |
| Challenges and Opportunities of Large Language Model Security |
| FU Zhiyuan, CHEN Siyu, CHEN Junfan, HAI Xiang, SHI Yansong, LI Xiaoqi, LI Yihong, YUE Qiuling, ZHANG Yuqing |
| Published September 18, 2024 |
| 2024,9(5):26-55 [Abstract] [View PDF(2.58 M)] |
| |
| A Review of Jailbreak Attacks and Defenses for Large Language Models |
| LIANG Siyuan, HE Yingzhe, LIU Aishan, LI Jingzhi, DAI Pengwen, CAO Xiaochun |
| Published September 18, 2024 |
| 2024,9(5):56-86 [Abstract] [View PDF(11.32 M)] |
| |
| A Review of Security Research in the Development Stage of Software Supply Chain Enhanced by Large Models |
| LIU Jingqiang, TIAN Xing, SHU Yuqi, ZHU Xiaoxi, LIU Yuling, LIU Qixu |
| Published September 18, 2024 |
| 2024,9(5):87-109 [Abstract] [View PDF(1.33 M)] |
| |
| Malware Detection and Classification Based on API Block Reconstruction and Image Representation |
| YANG Hongyu, ZHANG Yupei, ZHANG Liang, CHENG Xiang |
| Published September 18, 2024 |
| 2024,9(5):110-126 [Abstract] [View PDF(4.24 M)] |
| |
| Robust Watermarking for Protect Transformer Intellectual Property |
| WANG Baowei, ZHENG Weiqian |
| Published September 18, 2024 |
| 2024,9(5):127-138 [Abstract] [View PDF(893.69 K)] |
| |
| A Survey on Image Visualization Approaches-based Malware Classification Techniques |
| QIAN Liping, WANG Dawei |
| Published September 18, 2024 |
| 2024,9(5):139-161 [Abstract] [View PDF(2.05 M)] |
| |
| Android Malware Detection Based on Multi-view Representation Learning |
| ZHAO Wenxiang, MENG Zhaoyi, XIONG Yan, HUANG Wenchao |
| Published September 18, 2024 |
| 2024,9(5):162-177 [Abstract] [View PDF(1.46 M)] |
| |
| A Certificateless Subgroup Multi-Signature Scheme |
| WANG Yuhang, XU Zheqing, WANG Zhiwei, LIU Feng |
| Published September 18, 2024 |
| 2024,9(5):178-188 [Abstract] [View PDF(558.62 K)] |
| |
| A Survey of Ethereum Illegal Detection Methods |
| LI Meng, LIANG Guangjun, YIN Jie, MA Zhuo, ZHANG Yi |
| Published September 18, 2024 |
| 2024,9(5):189-216 [Abstract] [View PDF(2.01 M)] |
| |
| Robust Image Encryption Based on Improved Logistic Chaos and Cross-Chaos Diffusion |
| GUO Yuan, JIA Debao, WANG Chong, ZHAI Ping |
| Published September 18, 2024 |
| 2024,9(5):217-228 [Abstract] [View PDF(14.98 M)] |
| |
| Malicious Domain Names Detection Methods Analysis: A Survey |
| WANG Qing, HAN Dongxu, LU Zhigang, JIANG Bo, DONG Cong, LIU Junrong, SHI Wenchang, LIU Yuling |
| Published September 18, 2024 |
| 2024,9(5):229-249 [Abstract] [View PDF(832.75 K)] |
| |