Login / Signup
Demystifying RCE Vulnerabilities in LLM-Integrated Apps.
Tong Liu
Zizhuang Deng
Guozhu Meng
Yuekang Li
Kai Chen
Published in:
CoRR (2023)
Keyphrases
</>
expert systems
data sets
neural network
data mining
artificial intelligence
optimal solution
information security
mobile applications
countermeasures
integrating multiple
attack graphs