ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2301.00665
  4. Cited By
Targeted Phishing Campaigns using Large Scale Language Models

Targeted Phishing Campaigns using Large Scale Language Models

30 December 2022
Rabimba Karanjai
ArXiv (abs)PDFHTML

Papers citing "Targeted Phishing Campaigns using Large Scale Language Models"

24 / 24 papers shown
Title
SoK: Exposing the Generation and Detection Gaps in LLM-Generated Phishing Through Examination of Generation Methods, Content Characteristics, and Countermeasures
SoK: Exposing the Generation and Detection Gaps in LLM-Generated Phishing Through Examination of Generation Methods, Content Characteristics, and Countermeasures
Fengchao Chen
Tingmin Wu
Van Nguyen
Carsten Rudolph
107
0
0
29 Aug 2025
Evaluating Large Language Models' Capability to Launch Fully Automated
  Spear Phishing Campaigns: Validated on Human Subjects
Evaluating Large Language Models' Capability to Launch Fully Automated Spear Phishing Campaigns: Validated on Human Subjects
Fred Heiding
Simon Lermen
Andrew Kao
B. Schneier
A. Vishwanath
342
21
0
30 Nov 2024
Eyes on the Phish(er): Towards Understanding Users' Email Processing
  Pattern and Mental Models in Phishing Detection
Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing DetectionEuropean Symposium on Usable Security (EuroUSEC), 2024
Sijie Zhuo
R. Biddle
Jared Daniel Recomendable
Giovanni Russello
Danielle M Lottridge
111
5
0
12 Sep 2024
Investigating the Effectiveness of Bayesian Spam Filters in Detecting
  LLM-modified Spam Mails
Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails
Malte Josten
Torben Weis
70
5
0
26 Aug 2024
Is Generative AI the Next Tactical Cyber Weapon For Threat Actors?
  Unforeseen Implications of AI Generated Cyber Attacks
Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks
Yusuf Usman
Aadesh Upadhyay
P. Gyawali
Robin Chataut
AAML
215
6
0
23 Aug 2024
Measure-Observe-Remeasure: An Interactive Paradigm for
  Differentially-Private Exploratory Analysis
Measure-Observe-Remeasure: An Interactive Paradigm for Differentially-Private Exploratory Analysis
Priyanka Nanayakkara
Hyeok Kim
Yifan Wu
Ali Sarvghad
Narges Mahyar
G. Miklau
Jessica Hullman
203
36
0
04 Jun 2024
Embracing the Generative AI Revolution: Advancing Tertiary Education in
  Cybersecurity with GPT
Embracing the Generative AI Revolution: Advancing Tertiary Education in Cybersecurity with GPT
Raza Nowrozy
David Jam
AI4CE
170
5
0
18 Mar 2024
KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for
  Enhancing Reference-Based Phishing Detection
KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection
Yuexin Li
Chengyu Huang
Shumin Deng
Mei Lin Lock
Tri Cao
Nay Oo
Hoon Wei Lim
Bryan Hooi
291
44
0
04 Mar 2024
Large Language Models in Cybersecurity: State-of-the-Art
Large Language Models in Cybersecurity: State-of-the-Art
Farzad Nourmohammadzadeh Motlagh
Mehrdad Hajizadeh
Mehryar Majd
Pejman Najafi
Feng Cheng
Christoph Meinel
ELM
214
82
0
30 Jan 2024
Provably Robust Multi-bit Watermarking for AI-generated Text
Provably Robust Multi-bit Watermarking for AI-generated Text
Wenjie Qu
Dong Yin
Zixin He
Wei Zou
Tianyang Tao
Jinyuan Jia
Jiaheng Zhang
Jinyuan Jia
Jiaheng Zhang
WaLM
463
15
0
30 Jan 2024
Black-Box Access is Insufficient for Rigorous AI Audits
Black-Box Access is Insufficient for Rigorous AI AuditsConference on Fairness, Accountability and Transparency (FAccT), 2024
Stephen Casper
Carson Ezell
Charlotte Siegmann
Noam Kolt
Taylor Lynn Curtis
...
Michael Gerovitch
David Bau
Max Tegmark
David M. Krueger
Dylan Hadfield-Menell
AAML
460
126
0
25 Jan 2024
BadLlama: cheaply removing safety fine-tuning from Llama 2-Chat 13B
BadLlama: cheaply removing safety fine-tuning from Llama 2-Chat 13B
Pranav M. Gade
Simon Lermen
Charlie Rogers-Smith
Jeffrey Ladish
ALMAI4MH
301
34
0
31 Oct 2023
From Chatbots to PhishBots? -- Preventing Phishing scams created using
  ChatGPT, Google Bard and Claude
From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude
Sayak Saha Roy
Poojitha Thota
Krishna Vamsi Naragam
Shirin Nilizadeh
SILM
267
23
0
29 Oct 2023
Cyber Sentinel: Exploring Conversational Agents in Streamlining Security
  Tasks with GPT-4
Cyber Sentinel: Exploring Conversational Agents in Streamlining Security Tasks with GPT-4
Mehrdad Kaheh
Danial Khosh Kholgh
Panos Kostakos
175
24
0
28 Sep 2023
Devising and Detecting Phishing: Large Language Models vs. Smaller Human
  Models
Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models
Fredrik Heiding
B. Schneier
A. Vishwanath
Jeremy Bernstein
Peter S. Park
156
43
0
23 Aug 2023
An Empirical Study of AI-based Smart Contract Creation
An Empirical Study of AI-based Smart Contract CreationConference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 2023
Rabimba Karanjai
Edward Li
Lei Xu
W. Shi
170
13
0
05 Aug 2023
Domain Specialization as the Key to Make Large Language Models
  Disruptive: A Comprehensive Survey
Domain Specialization as the Key to Make Large Language Models Disruptive: A Comprehensive SurveyACM Computing Surveys (ACM Comput. Surv.), 2023
Chen Ling
Xujiang Zhao
Jiaying Lu
Chengyuan Deng
Can Zheng
...
Chris White
Quanquan Gu
Jian Pei
Carl Yang
Bo Pan
ALM
336
206
0
30 May 2023
Chatbots to ChatGPT in a Cybersecurity Space: Evolution,
  Vulnerabilities, Attacks, Challenges, and Future Recommendations
Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations
Attia Qammar
Hongmei Wang
Jianguo Ding
Abdenacer Naouri
M. Daneshmand
Huansheng Ning
SILM
148
23
0
29 May 2023
Beyond the Safeguards: Exploring the Security Risks of ChatGPT
Beyond the Safeguards: Exploring the Security Risks of ChatGPT
Erik Derner
Kristina Batistic
SILM
149
81
0
13 May 2023
Generating Phishing Attacks using ChatGPT
Generating Phishing Attacks using ChatGPT
Sayak Saha Roy
Krishna Vamsi Naragam
Shirin Nilizadeh
223
41
0
09 May 2023
Algorithmic Ghost in the Research Shell: Large Language Models and
  Academic Knowledge Creation in Management Research
Algorithmic Ghost in the Research Shell: Large Language Models and Academic Knowledge Creation in Management Research
Nigel Williams
S. Ivanov
Dimitrios Buhalis
KELM
132
11
0
10 Mar 2023
ChatGPT: Jack of all trades, master of none
ChatGPT: Jack of all trades, master of noneInformation Fusion (Inf. Fusion), 2023
Jan Kocoñ
Igor Cichecki
Oliwier Kaszyca
Mateusz Kochanek
Dominika Szydło
...
Maciej Piasecki
Lukasz Radliñski
Konrad Wojtasik
Stanislaw Wo'zniak
Przemyslaw Kazienko
AI4MH
481
663
0
21 Feb 2023
Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and
  Resources
Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and ResourcesItalian Conference on Cybersecurity (IC), 2023
E. Cambiaso
L. Caviglione
87
28
0
10 Feb 2023
Chatbots in a Honeypot World
Chatbots in a Honeypot World
Forrest McKee
David Noever
152
24
0
10 Jan 2023
1