Search Results for author: Xiaojing Liao

Found 4 papers, 1 papers with code

Malla: Demystifying Real-world Large Language Model Integrated Malicious Services

no code implementations6 Jan 2024 Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang

The underground exploitation of large language models (LLMs) for malicious services (i. e., Malla) is witnessing an uptick, amplifying the cyber threat landscape and posing questions about the trustworthiness of LLM technologies.

Language Modelling Large Language Model

MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion

no code implementations22 Apr 2023 Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu

As a prominent instance of vandalism edits, Wiki search poisoning for illicit promotion is a cybercrime in which the adversary aims at editing Wiki articles to promote illicit businesses through Wiki search results of relevant queries.

Cybersecurity Entity Alignment via Masked Graph Attention Networks

no code implementations4 Jul 2022 Yue Qin, Xiaojing Liao

Cybersecurity vulnerability information is often recorded by multiple channels, including government vulnerability repositories, individual-maintained vulnerability-gathering platforms, or vulnerability-disclosure email lists and forums.

Entity Alignment Graph Attention

Learning Security Classifiers with Verified Global Robustness Properties

1 code implementation24 May 2021 Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David Wagner

Since data distribution shift is very common in security applications, e. g., often observed for malware detection, local robustness cannot guarantee that the property holds for unseen inputs at the time of deploying the classifier.

Malware Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.