Search Results for author: Zilong Lin

Found 3 papers, 0 papers with code

Malla: Demystifying Real-world Large Language Model Integrated Malicious Services

no code implementations6 Jan 2024 Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang

The underground exploitation of large language models (LLMs) for malicious services (i. e., Malla) is witnessing an uptick, amplifying the cyber threat landscape and posing questions about the trustworthiness of LLM technologies.

Language Modelling Large Language Model

MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion

no code implementations22 Apr 2023 Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu

As a prominent instance of vandalism edits, Wiki search poisoning for illicit promotion is a cybercrime in which the adversary aims at editing Wiki articles to promote illicit businesses through Wiki search results of relevant queries.

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

no code implementations6 Sep 2018 Zilong Lin, Yong Shi, Zhi Xue

Given that the internal structure and parameters of the detection system are unknown to attackers, the adversarial attack examples perform the black-box attacks against the detection system.

Adversarial Attack Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.