ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2307.00691
  4. Cited By
From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and
  Privacy

From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy

3 July 2023
Maanak Gupta
Charankumar Akiri
Kshitiz Aryal
Elisabeth Parker
Lopamudra Praharaj
    SILM
ArXivPDFHTML

Papers citing "From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy"

50 / 124 papers shown
Title
Analysing Safety Risks in LLMs Fine-Tuned with Pseudo-Malicious Cyber Security Data
Analysing Safety Risks in LLMs Fine-Tuned with Pseudo-Malicious Cyber Security Data
Adel ElZemity
Budi Arief
Shujun Li
17
0
0
15 May 2025
Securing RAG: A Risk Assessment and Mitigation Framework
Securing RAG: A Risk Assessment and Mitigation Framework
Lukas Ammann
Sara Ott
Christoph R. Landolt
Marco P. Lehmann
SILM
29
0
0
13 May 2025
A Large-Scale Empirical Analysis of Custom GPTs' Vulnerabilities in the OpenAI Ecosystem
A Large-Scale Empirical Analysis of Custom GPTs' Vulnerabilities in the OpenAI Ecosystem
Sunday Oyinlola Ogundoyin
Muhammad Ikram
H. Asghar
Benjamin Zi Hao Zhao
Dali Kaafar
SILM
ELM
31
0
0
13 May 2025
On Developers' Self-Declaration of AI-Generated Code: An Analysis of Practices
On Developers' Self-Declaration of AI-Generated Code: An Analysis of Practices
Syed Mohammad Kashif
Peng Liang
Amjed Tahir
22
0
0
23 Apr 2025
Reflexive Prompt Engineering: A Framework for Responsible Prompt Engineering and Interaction Design
Reflexive Prompt Engineering: A Framework for Responsible Prompt Engineering and Interaction Design
Christian Djeffal
26
0
0
22 Apr 2025
Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering
Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering
Hamed Jelodar
Samita Bai
Parisa Hamedi
Hesamodin Mohammadian
R. Razavi-Far
Ali Ghorbani
34
0
0
07 Apr 2025
Code Red! On the Harmfulness of Applying Off-the-shelf Large Language Models to Programming Tasks
Code Red! On the Harmfulness of Applying Off-the-shelf Large Language Models to Programming Tasks
Ali Al-Kaswan
Sebastian Deatc
Begüm Koç
A. van Deursen
M. Izadi
AAML
33
0
0
02 Apr 2025
Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text Rewriting
Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text Rewriting
Stephen Meisenbacher
Chaeeun Joy Lee
Florian Matthes
46
0
0
28 Mar 2025
Prompt, Divide, and Conquer: Bypassing Large Language Model Safety Filters via Segmented and Distributed Prompt Processing
Prompt, Divide, and Conquer: Bypassing Large Language Model Safety Filters via Segmented and Distributed Prompt Processing
Johan Wahréus
Ahmed Mohamed Hussain
P. Papadimitratos
51
0
0
27 Mar 2025
Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance
Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance
Austin Shouli
Ankur Barthwal
Molly Campbell
A. Shrestha
45
1
0
15 Mar 2025
CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security Data
CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security Data
Adel ElZemity
Budi Arief
Shujun Li
54
2
0
12 Mar 2025
MAD-MAX: Modular And Diverse Malicious Attack MiXtures for Automated LLM Red Teaming
Stefan Schoepf
Muhammad Zaid Hameed
Ambrish Rawat
Kieran Fraser
Giulio Zizzo
Giandomenico Cornacchia
Mark Purcell
31
0
0
08 Mar 2025
LLMs' Reshaping of People, Processes, Products, and Society in Software Development: A Comprehensive Exploration with Early Adopters
Benyamin Tabarsi
Heidi Reichert
Ally Limke
Sandeep Kuttal
Tiffany Barnes
36
1
0
06 Mar 2025
Privacy Preservation Techniques (PPTs) in IoT Systems: A Scoping Review and Future Directions
Emmanuel Alalade
Ashraf Matrawy
38
0
0
04 Mar 2025
Jailbreaking Generative AI: Empowering Novices to Conduct Phishing Attacks
Rina Mishra
Gaurav Varshney
Shreya Singh
41
0
0
03 Mar 2025
Experiences with Content Development and Assessment Design in the Era of GenAI
Aakanksha Sharma
S. Shailendra
Rajan Kadel
31
0
0
28 Feb 2025
Detecting Phishing Sites Using ChatGPT
Detecting Phishing Sites Using ChatGPT
Takashi Koide
Naoki Fukushi
Hiroki Nakano
Daiki Chiba
80
31
0
17 Feb 2025
Generative AI for Internet of Things Security: Challenges and Opportunities
Generative AI for Internet of Things Security: Challenges and Opportunities
Yan Lin Aung
Ivan Christian
Ye Dong
Xiaodong Ye
Sudipta Chattopadhyay
Jianying Zhou
54
1
0
13 Feb 2025
On the Impact of Noise in Differentially Private Text Rewriting
On the Impact of Noise in Differentially Private Text Rewriting
Stephen Meisenbacher
Maulik Chevli
Florian Matthes
58
0
0
31 Jan 2025
Investigation of the Privacy Concerns in AI Systems for Young Digital Citizens: A Comparative Stakeholder Analysis
Investigation of the Privacy Concerns in AI Systems for Young Digital Citizens: A Comparative Stakeholder Analysis
Molly Campbell
Ankur Barthwal
Sandhya Joshi
Austin Shouli
A. Shrestha
69
4
0
23 Jan 2025
Toward Ethical AI: A Qualitative Analysis of Stakeholder Perspectives
Toward Ethical AI: A Qualitative Analysis of Stakeholder Perspectives
A. Shrestha
Sandhya Joshi
63
3
0
23 Jan 2025
Generative Artificial Intelligence-Supported Pentesting: A Comparison between Claude Opus, GPT-4, and Copilot
Antonio López Martínez
Alejandro Cano
Antonio Ruiz-Martínez
ELM
41
1
0
12 Jan 2025
Navigating AI to Unpack Youth Privacy Concerns: An In-Depth Exploration
  and Systematic Review
Navigating AI to Unpack Youth Privacy Concerns: An In-Depth Exploration and Systematic Review
A. Shrestha
Ankur Barthwal
Molly Campbell
Austin Shouli
Saad Syed
Sandhya Joshi
Julita Vassileva
75
3
0
20 Dec 2024
Optimizing AI-Assisted Code Generation
Optimizing AI-Assisted Code Generation
Simon Torka
Sahin Albayrak
70
0
0
14 Dec 2024
Sensitive Content Classification in Social Media: A Holistic Resource
  and Evaluation
Sensitive Content Classification in Social Media: A Holistic Resource and Evaluation
Dimosthenis Antypas
Indira Sen
Carla Pérez-Almendros
Jose Camacho-Collados
Francesco Barbieri
64
1
0
29 Nov 2024
Quantized Delta Weight Is Safety Keeper
Quantized Delta Weight Is Safety Keeper
Yule Liu
Zhen Sun
Xinlei He
Xinyi Huang
88
2
0
29 Nov 2024
Preventing Jailbreak Prompts as Malicious Tools for Cybercriminals: A
  Cyber Defense Perspective
Preventing Jailbreak Prompts as Malicious Tools for Cybercriminals: A Cyber Defense Perspective
Jean Marie Tshimula
Xavier Ndona
D'Jeff K. Nkashama
Pierre Martin Tardif
F. Kabanza
Marc Frappier
Shengrui Wang
SILM
81
0
0
25 Nov 2024
Developer Perspectives on Licensing and Copyright Issues Arising from Generative AI for Software Development
Trevor Stalnaker
Nathan Wintersgill
Oscar Chaparro
Laura A. Heymann
M. D. Penta
Daniel M German
Denys Poshyvanyk
33
0
0
16 Nov 2024
The Dark Side of AI Companionship: A Taxonomy of Harmful Algorithmic
  Behaviors in Human-AI Relationships
The Dark Side of AI Companionship: A Taxonomy of Harmful Algorithmic Behaviors in Human-AI Relationships
Renwen Zhang
Han Li
Han Meng
Jinyuan Zhan
Hongyuan Gan
Yi-Chieh Lee
19
0
0
26 Oct 2024
ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
ProveRAG: Provenance-Driven Vulnerability Analysis with Automated Retrieval-Augmented LLMs
Reza Fayyazi
Stella Hoyos Trueba
Michael Zuzak
S. Yang
31
0
0
22 Oct 2024
The Best Defense is a Good Offense: Countering LLM-Powered Cyberattacks
The Best Defense is a Good Offense: Countering LLM-Powered Cyberattacks
Daniel Ayzenshteyn
Roy Weiss
Yisroel Mirsky
AAML
26
0
0
20 Oct 2024
Boardwalk Empire: How Generative AI is Revolutionizing Economic
  Paradigms
Boardwalk Empire: How Generative AI is Revolutionizing Economic Paradigms
Subramanyam Sahoo
Kamlesh Dutta
28
1
0
19 Oct 2024
SoK: Prompt Hacking of Large Language Models
SoK: Prompt Hacking of Large Language Models
Baha Rababah
Shang
Wu
Matthew Kwiatkowski
Carson Leung
Cuneyt Gurcan Akcora
AAML
38
2
0
16 Oct 2024
Bridging the Protection Gap: Innovative Approaches to Shield Older
  Adults from AI-Enhanced Scams
Bridging the Protection Gap: Innovative Approaches to Shield Older Adults from AI-Enhanced Scams
LD Herrera
London Van Sickle
Ashley Podhradsky
24
0
0
26 Sep 2024
Contextualized AI for Cyber Defense: An Automated Survey using LLMs
Contextualized AI for Cyber Defense: An Automated Survey using LLMs
Christoforus Yoga Haryanto
Anne Maria Elvira
Trung Duc Nguyen
Minh Hieu Vu
Yoshiano Hartanto
Emily Lomempow
Arathi Arakala
38
0
0
20 Sep 2024
Exploring LLMs for Malware Detection: Review, Framework Design, and
  Countermeasure Approaches
Exploring LLMs for Malware Detection: Review, Framework Design, and Countermeasure Approaches
Jamal N. Al-Karaki
Muhammad Al-Zafar Khan
Marwan Omar
34
6
0
11 Sep 2024
Is Generative AI the Next Tactical Cyber Weapon For Threat Actors?
  Unforeseen Implications of AI Generated Cyber Attacks
Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks
Yusuf Usman
Aadesh Upadhyay
P. Gyawali
Robin Chataut
AAML
43
2
0
23 Aug 2024
Efficient Detection of Toxic Prompts in Large Language Models
Efficient Detection of Toxic Prompts in Large Language Models
Yi Liu
Junzhe Yu
Huijia Sun
Ling Shi
Gelei Deng
Yuqi Chen
Yang Liu
29
4
0
21 Aug 2024
Enhancing AI-based Generation of Software Exploits with Contextual
  Information
Enhancing AI-based Generation of Software Exploits with Contextual Information
Pietro Liguori
Cristina Improta
R. Natella
B. Cukic
Domenico Cotroneo
27
0
0
05 Aug 2024
Risks, Causes, and Mitigations of Widespread Deployments of Large
  Language Models (LLMs): A Survey
Risks, Causes, and Mitigations of Widespread Deployments of Large Language Models (LLMs): A Survey
Md. Nazmus Sakib
Md Athikul Islam
Royal Pathak
Md Mashrur Arifin
ALM
PILM
29
2
0
01 Aug 2024
Is the Digital Forensics and Incident Response Pipeline Ready for
  Text-Based Threats in LLM Era?
Is the Digital Forensics and Incident Response Pipeline Ready for Text-Based Threats in LLM Era?
AV Bhandarkar
Ronald Wilson
Anushka Swarup
Mengdi Zhu
Damon Woodard
29
0
0
25 Jul 2024
RedAgent: Red Teaming Large Language Models with Context-aware
  Autonomous Language Agent
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent
Huiyu Xu
Wenhui Zhang
Zhibo Wang
Feng Xiao
Rui Zheng
Yunhe Feng
Zhongjie Ba
Kui Ren
AAML
LLMAG
29
11
0
23 Jul 2024
Framework for Adoption of Generative Artificial Intelligence (GenAI) in
  Education
Framework for Adoption of Generative Artificial Intelligence (GenAI) in Education
S. Shailendra
Rajan Kadel
Aakanksha Sharma
AI4CE
13
10
0
21 Jul 2024
A Survey on the Application of Generative Adversarial Networks in
  Cybersecurity: Prospective, Direction and Open Research Scopes
A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes
Md Mashrur Arifin
Md Shoaib Ahmed
Tanmai Kumar Ghosh
Jun Zhuang
Jyh-haw Yeh
AAML
32
4
0
11 Jul 2024
A Comprehensive Survey on the Security of Smart Grid: Challenges,
  Mitigations, and Future Research Opportunities
A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities
Arastoo Zibaeirad
Farnoosh Koleini
Shengping Bi
Tao Hou
Tao Wang
AAML
40
14
0
10 Jul 2024
Identifying the Source of Generation for Large Language Models
Identifying the Source of Generation for Large Language Models
Bumjin Park
Jaesik Choi
24
0
0
05 Jul 2024
Jailbreak Attacks and Defenses Against Large Language Models: A Survey
Jailbreak Attacks and Defenses Against Large Language Models: A Survey
Sibo Yi
Yule Liu
Zhen Sun
Tianshuo Cong
Xinlei He
Jiaxing Song
Ke Xu
Qi Li
AAML
34
80
0
05 Jul 2024
Actionable Cyber Threat Intelligence using Knowledge Graphs and Large
  Language Models
Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models
Romy Fieblinger
Md Tanvirul Alam
Nidhi Rastogi
22
8
0
30 Jun 2024
Assessing the Effectiveness of LLMs in Android Application Vulnerability
  Analysis
Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis
Vasileios Kouliaridis
Georgios Karopoulos
G. Kambourakis
AAML
36
2
0
27 Jun 2024
Psychological Profiling in Cybersecurity: A Look at LLMs and
  Psycholinguistic Features
Psychological Profiling in Cybersecurity: A Look at LLMs and Psycholinguistic Features
Jean Marie Tshimula
D'Jeff K. Nkashama
Jean Tshibangu Muabila
René Manassé Galekwa
Hugues Kanda
...
Belkacem Chikhaoui
Shengrui Wang
Ali Mulenda Sumbu
Xavier Ndona
Raoul Kienge-Kienge Intudi
47
0
0
26 Jun 2024
123
Next