{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T00:19:21Z","timestamp":1723681161729},"reference-count":173,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3439363","type":"journal-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T18:18:37Z","timestamp":1722968317000},"page":"109470-109493","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Autonomous System Security and Resilience With Generative AI: A Comprehensive Survey"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4170-4341","authenticated-orcid":false,"given":"Martin","family":"Andreoni","sequence":"first","affiliation":[{"name":"Technology Innovation Institute, Masdar City, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0718-0019","authenticated-orcid":false,"given":"Willian Tessaro","family":"Lunardi","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute, Masdar City, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-7309-5100","authenticated-orcid":false,"given":"George","family":"Lawton","sequence":"additional","affiliation":[{"name":"Independent Researcher, Beckenham, London, U.K."}]},{"given":"Shreekant","family":"Thakkar","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute, Masdar City, Abu Dhabi, United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","article-title":"AI robots and humanoid AI: Review, perspectives and directions","author":"Cao","year":"2024","journal-title":"arXiv:2405.15775"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037705"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2023.3335180"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3673225"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/9781316671528"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00068"},{"issue":"1","key":"ref7","first-page":"19","article-title":"IDS-GAN: Stepping up intrusion detection method using GAN algorithm","volume":"5","author":"Fan","year":"2023","journal-title":"Int. J. Infor. Comput."},{"key":"ref8","article-title":"Mapping LLM security landscapes: A comprehensive stakeholder risk assessment proposal","author":"Pankajakshan","year":"2024","journal-title":"arXiv:2403.13309"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITME53901.2021.00041"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2022.101824"},{"volume-title":"Large Language Models in Information Security Research: A Jan. 2024 Survey","year":"2024","author":"Dube","key":"ref11"},{"key":"ref12","article-title":"Generative AI security: Challenges and countermeasures","author":"Zhu","year":"2024","journal-title":"arXiv:2402.12617"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104016"},{"key":"ref14","article-title":"A survey of large language models in cybersecurity","author":"de Jesus Coelho da Silva","year":"2024","journal-title":"arXiv:2402.16968"},{"key":"ref15","article-title":"Large language models in cybersecurity: State-of-the-art","author":"Nourmohammadzadeh Motlagh","year":"2024","journal-title":"arXiv:2402.00891"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"ref17","article-title":"Generative AI and large language models for cyber security: All insights you need","author":"Amine Ferrag","year":"2024","journal-title":"arXiv:2405.12750"},{"key":"ref18","article-title":"When LLMs meet cybersecurity: A systematic literature review","author":"Zhang","year":"2024","journal-title":"arXiv:2405.03644"},{"key":"ref19","article-title":"A comprehensive overview of large language models (LLMs) for cyber defences: Opportunities and directions","author":"Hassanin","year":"2024","journal-title":"arXiv:2405.14487"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3381611"},{"key":"ref21","article-title":"Large language models for UAVs: Current state and pathways to the future","author":"Javaid","year":"2024","journal-title":"arXiv:2405.01745"},{"key":"ref22","article-title":"Generative AI for unmanned vehicle swarms: Challenges, applications and opportunities","author":"Liu","year":"2024","journal-title":"arXiv:2402.18062"},{"key":"ref23","article-title":"Large language models for robotics: A survey","author":"Zeng","year":"2023","journal-title":"arXiv:2311.07226"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11370-024-00550-5"},{"key":"ref25","article-title":"Large language models for robotics: Opportunities, challenges, and perspectives","author":"Wang","year":"2024","journal-title":"arXiv:2401.04334"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363657"},{"key":"ref27","article-title":"A zero trust framework for realization and defense against generative AI attacks in power grid","author":"Shirajum Munir","year":"2024","journal-title":"arXiv:2403.06388"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3353265"},{"key":"ref30","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Adv. Neural Inf. Process Syst.","volume":"33","author":"Brown"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.3004171"},{"key":"ref32","article-title":"A survey on multimodal large language models","author":"Yin","year":"2023","journal-title":"arXiv:2306.13549"},{"key":"ref33","article-title":"GPT-4 technical report","volume-title":"arXiv:2303.08774","author":"OpenAI","year":"2023"},{"key":"ref34","article-title":"Gemini: A family of highly capable multimodal models","author":"Team","year":"2023","journal-title":"arXiv:2312.11805"},{"key":"ref35","article-title":"LLaMA: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv:2302.13971"},{"volume-title":"Meta Llama 3","year":"2024","key":"ref36"},{"volume-title":"Mistral AI","year":"2023","key":"ref37"},{"key":"ref38","article-title":"The Refined-Web dataset for falcon LLM: Outperforming curated corpora with web data, and web data only","author":"Penedo","year":"2023","journal-title":"arXiv:2306.01116"},{"key":"ref39","article-title":"Orca: Progressive learning from complex explanation traces of GPT-4","author":"Mukherjee","year":"2023","journal-title":"arXiv:2306.02707"},{"volume-title":"Claude 3 Family","year":"2024","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6114"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3626235"},{"key":"ref44","first-page":"1","article-title":"Stablerep: Synthetic images from text-to-image models make strong visual representation learners","volume-title":"Proc. Adv. Neural Inf. Process Syst.","volume":"36","author":"Tian"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2992934"},{"key":"ref46","first-page":"20578","article-title":"Why normalizing flows fail to detect out-of-distribution data","volume-title":"Proc. NIPS","volume":"33","author":"Kirichenko"},{"key":"ref47","article-title":"Retrospectives on the embodied AI workshop","author":"Deitke","year":"2022","journal-title":"arXiv:2210.06849"},{"key":"ref48","article-title":"Highlighting the safety concerns of deploying LLMs\/VLMs in robotics","author":"Wu","year":"2024","journal-title":"arXiv:2402.10340"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2019.8914585"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/app13053136"},{"key":"ref51","first-page":"621","article-title":"Generative adversarial networks for failure prediction","volume-title":"Proc. Eur. Conf. Mach. Learn. Prin. Prac. Know. Disc. Datab","author":"Zheng"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00508"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/s24041330"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.12.093"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3069452"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/IROS47612.2022.9982240"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3327715"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-024-40231-1"},{"key":"ref59","article-title":"Open X-embodiment: Robotic learning datasets and RT-X models","author":"X-Embodiment Collaboration","year":"2023","journal-title":"arXiv:2310.08864"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC47050.2019.9064184"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107357"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2023.3269380"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3105226"},{"key":"ref64","article-title":"TypeFly: Flying drones with large language model","author":"Chen","year":"2023","journal-title":"arXiv:2312.14950"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW60836.2024.00106"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3387941"},{"key":"ref67","article-title":"Do as I can, not as I say: Grounding language in robotic affordances","author":"Ahn","year":"2022","journal-title":"arXiv:2204.01691"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2023.121949"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICA54878.2022.9844489"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/iSAI-NLP60301.2023.10354608"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028865"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MLCCIM55934.2022.00081"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.12.018"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.110"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION52260.2023.10224196"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS51884.2021.9476736"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2018.2857475"},{"key":"ref78","article-title":"CLIPSwarm: Generating drone shows from text prompts with vision-language models","author":"Pueyo","year":"2024","journal-title":"arXiv:2403.13467"},{"key":"ref79","article-title":"Wireless multi-agent generative AI: From connected intelligence to collective intelligence","author":"Zou","year":"2023","journal-title":"arXiv:2307.02757"},{"key":"ref80","article-title":"Generative AI-aided optimization for AI-generated content (AIGC) services in edge networks","author":"Du","year":"2023","journal-title":"arXiv:2303.13052"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3317629"},{"key":"ref82","article-title":"Blockchain-enhanced UAV networks for post-disaster communication: A decentralized flocking approach","author":"Hafeez","year":"2024","journal-title":"arXiv:2403.04796"},{"key":"ref83","first-page":"27107","article-title":"Grin: Generative relation and intention network for multi-agent trajectory prediction","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Li"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106085"},{"key":"ref85","article-title":"Generative AI for space-air-ground integrated networks (SAGIN)","author":"Zhang","year":"2023","journal-title":"arXiv:2311.06523"},{"issue":"1","key":"ref86","first-page":"1","article-title":"Exploring collaborative distributed diffusion-based AI-generated content (AIGC) in wireless networks","volume":"1","author":"Du","year":"2023","journal-title":"IEEE Netw."},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3220981"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1177\/15501477221075544"},{"key":"ref89","article-title":"Generative AI-driven semantic communication networks: Architecture, technologies and applications","author":"Liang","year":"2023","journal-title":"arXiv:2401.00124"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.013.2300485"},{"key":"ref91","article-title":"Generative AI for advanced UAV networking","author":"Sun","year":"2024","journal-title":"arXiv:2404.10556"},{"issue":"2","key":"ref92","first-page":"1","article-title":"MIMO channel estimation using score-based generative models","volume":"1","author":"Arvinte","year":"2022","journal-title":"IEEE Trans. Wireless Commun."},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S58398.2023.00037"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-024-01889-0"},{"key":"ref95","article-title":"A survey of language-based communication in robotics","author":"Hunt","year":"2024","journal-title":"arXiv:2406.04086"},{"volume-title":"Pentagon Testing Generative AI in \u2018global Information Dominance\u2019 Experiments","year":"2024","author":"Harper","key":"ref96"},{"volume-title":"Trustworthy Generative Artificial Intelligence (GenAI) to Structure Data and Deliver Accurate Insights of Command, Control, Communication and Computer (C4) Systems","year":"2024","key":"ref97"},{"volume-title":"Generative AI for Defense","year":"2024","key":"ref98"},{"key":"ref99","article-title":"REAL: Resilience and adaptation using large language models on autonomous aerial robots","author":"Tagliabue","year":"2023","journal-title":"arXiv:2311.01403"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS61231.2024.10540749"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.birob.2023.100131"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3524844.3528054"},{"key":"ref103","article-title":"LLM as a robotic brain: Unifying egocentric memory and control","author":"Mai","year":"2023","journal-title":"arXiv:2304.09349"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/IROS55552.2023.10341488"},{"key":"ref105","article-title":"Learning to learn faster from human feedback with language model predictive control","author":"Liang","year":"2024","journal-title":"arXiv:2402.11450"},{"key":"ref106","article-title":"PaLM 2 technical report","volume-title":"arXiv:2305.10403","author":"Anil","year":"2023"},{"key":"ref107","article-title":"MetaMorph: Learning universal controllers with transformers","author":"Gupta","year":"2022","journal-title":"arXiv:2203.11931"},{"key":"ref108","article-title":"AUTOHALLUSION: Automatic generation of hallucination benchmarks for vision-language models","author":"Wu","year":"2024","journal-title":"arXiv:2406.10900"},{"key":"ref109","article-title":"Safety control of service robots with LLMs and embodied knowledge graphs","author":"Qi","year":"2024","journal-title":"arXiv:2405.17846"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00835-x"},{"key":"ref111","article-title":"LLM agents can autonomously exploit one-day vulnerabilities","author":"Fang","year":"2024","journal-title":"arXiv:2404.08144"},{"key":"ref112","article-title":"Large language models based fuzzing techniques: A survey","author":"Huang","year":"2024","journal-title":"arXiv:2402.00350"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24556"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639121"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3296707"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104005"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/s23187796"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527980"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3211346"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3229706"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.3390\/app9204221"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671824"},{"key":"ref123","article-title":"MalBERT: Using transformers for cybersecurity and malicious software detection","author":"Rahali","year":"2021","journal-title":"arXiv:2103.03806"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3652594"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24401"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3179384"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI52376.2021.9515086"},{"key":"ref128","article-title":"Pop quiz! Can a large language model help with reverse engineering?","author":"Pearce","year":"2022","journal-title":"arXiv:2202.01142"},{"key":"ref129","article-title":"Evaluation of LLM chatbots for OSINT-based cyber threat awareness","author":"Shafee","year":"2024","journal-title":"arXiv:2401.15127"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.nlp.2024.100074"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ISI58743.2023.10297274"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"ref133","article-title":"Intell-dragonfly: A cybersecurity attack surface generation engine based on artificial intelligence-generated content technology","author":"Wu","year":"2023","journal-title":"arXiv:2311.00240"},{"key":"ref134","article-title":"Spear or shield: Leveraging generative AI to tackle security threats of intelligent network services","author":"Du","year":"2023","journal-title":"arXiv:2306.02384"},{"key":"ref135","article-title":"Impacts and risk of generative AI technology on cyber defense","author":"Neupane","year":"2023","journal-title":"arXiv:2306.13033"},{"key":"ref136","article-title":"LLMs for cyber security: New opportunities","author":"Mon Divakaran","year":"2024","journal-title":"arXiv:2404.11338"},{"key":"ref137","article-title":"SecGPT: An execution isolation architecture for LLM-based systems","author":"Wu","year":"2024","journal-title":"arXiv:2403.04960"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363469"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3583740.3626809"},{"key":"ref140","article-title":"BadGPT: Exploring security vulnerabilities of ChatGPT via backdoor attacks to InstructGPT","author":"Shi","year":"2023","journal-title":"arXiv:2304.12298"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8884924","article-title":"SLAM: A malware detection method based on sliding local attention mechanism","volume":"2020","author":"Chen","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102371"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00124"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319213"},{"key":"ref145","first-page":"975","article-title":"FLOWGAN: Unbalanced network encrypted traffic identification method based on GAN","volume-title":"Proc. IEEE Intl. Conf. Parallel Distrib. Process. Appl., Big Data Cloud Comput., Sustain. Comput. Commun., Social Comput. Netw. (ISPA\/BDCloud\/SocialCom\/SustainCom)","author":"Wang"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4073"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-019-00925-6"},{"key":"ref148","first-page":"207","article-title":"Zero trust architecture","volume":"800","author":"Stafford","year":"2020","journal-title":"NIST special publication"},{"volume-title":"Building Trust in Generative AI With a Zero Trust Approach","year":"2024","author":"Freestone","key":"ref149"},{"volume-title":"The Second Worst100B Investment in The History of AI?","year":"2024","author":"Marcus","key":"ref150"},{"volume-title":"What CEOs Need to Know About the Costs of Adopting GenAI","year":"2023","author":"Huang","key":"ref151"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322377"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3032352"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3222834"},{"key":"ref155","article-title":"Scalable extraction of training data from (Production) language models","author":"Nasr","year":"2023","journal-title":"arXiv:2311.17035"},{"volume-title":"Securing the future of GenAI: Policy and technology","year":"2024","author":"Christodorescu","key":"ref156"},{"key":"ref157","article-title":"Sociotechnical safety evaluation of generative AI systems","author":"Weidinger","year":"2023","journal-title":"arXiv:2310.11986"},{"key":"ref158","first-page":"5253","article-title":"Extracting training data from diffusion models","volume-title":"Proc. 32nd USENIX Secur.","author":"Carlini"},{"key":"ref159","article-title":"Survey of vulnerabilities in large language models revealed by adversarial attacks","author":"Shayegani","year":"2023","journal-title":"arXiv:2310.10844"},{"key":"ref160","article-title":"JailbreakZoo: Survey, landscapes, and horizons in jailbreaking large language and vision-language models","author":"Jin","year":"2024","journal-title":"arXiv:2407.01599"},{"key":"ref161","article-title":"Phi-3 technical report: A highly capable language model locally on your phone","volume-title":"arXiv:2404.14219","author":"Abdin","year":"2024"},{"key":"ref162","article-title":"CyberMetric: A benchmark dataset based on retrieval-augmented generation for evaluating LLMs in cybersecurity knowledge","author":"Tihanyi","year":"2024","journal-title":"arXiv:2402.07688"},{"key":"ref163","article-title":"SecQA: A concise question-answering dataset for evaluating large language models in computer security","author":"Liu","year":"2023","journal-title":"arXiv:2312.15838"},{"key":"ref164","article-title":"The WMDP benchmark: Measuring and reducing malicious use with unlearning","author":"Li","year":"2024","journal-title":"arXiv:2403.03218"},{"key":"ref165","first-page":"1","article-title":"Cyberbench: A multi-task benchmark for evaluating large language models in cybersecurity","volume-title":"Proc. Workshop Art. Inte. Cyb. Secur. (AICS)","author":"Liu"},{"key":"ref166","article-title":"LLM4 Vuln: A unified evaluation framework for decoupling and enhancing LLMs\u2019 vulnerability reasoning","author":"Sun","year":"2024","journal-title":"arXiv:2401.16185"},{"key":"ref167","article-title":"Self-evaluation as a defense against adversarial attacks on LLMs","author":"Brown","year":"2024","journal-title":"arXiv:2407.03234"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3645090"},{"volume-title":"IEEE Standard for Transparency of Autonomous Systems","year":"2022","key":"ref169"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/3626314"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3320646"},{"issue":"7553","key":"ref172","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1038\/521415a","article-title":"Ethics of artificial intelligence","volume":"521","author":"Russell","year":"2015","journal-title":"Nature"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1111\/jnu.12938"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10623653.pdf?arnumber=10623653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T17:45:01Z","timestamp":1723657501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10623653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":173,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3439363","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}