Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks Authors: Yaokai Feng, Kouichi Sakurai | Published: 2025-10-27 2025.10.27 文献データベース
Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27 2025.10.27 文献データベース
Fast-MIA: Efficient and Scalable Membership Inference for LLMs Authors: Hiromu Takahashi, Shotaro Ishihara | Published: 2025-10-27 2025.10.27 文献データベース
Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies Authors: Bin Wang, YiLu Zhong, MiDi Wan, WenJie Yu, YuanBing Ouyang, Yenan Huang, Hui Li | Published: 2025-10-27 2025.10.27 文献データベース
RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23 2025.10.23 文献データベース
Learning to Triage Taint Flows Reported by Dynamic Program Analysis in Node.js Packages Authors: Ronghao Ni, Aidan Z. H. Yang, Min-Chien Hsu, Nuno Sabino, Limin Jia, Ruben Martins, Darion Cassel, Kevin Cheang | Published: 2025-10-23 2025.10.23 文献データベース
Black Box Absorption: LLMs Undermining Innovative Ideas Authors: Wenjun Cao | Published: 2025-10-23 2025.10.23 文献データベース
AdaDoS: Adaptive DoS Attack via Deep Adversarial Reinforcement Learning in SDN Authors: Wei Shao, Yuhao Wang, Rongguang He, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-10-23 2025.10.23 文献データベース
HHEML: Hybrid Homomorphic Encryption for Privacy-Preserving Machine Learning on Edge Authors: Yu Hin Chan, Hao Yang, Shiyu Shen, Xingyu Fan, Shengzhe Lyu, Patrick S. Y. Hung, Ray C. C. Cheung | Published: 2025-10-23 2025.10.23 文献データベース
Beyond Text: Multimodal Jailbreaking of Vision-Language and Audio Models through Perceptually Simple Transformations Authors: Divyanshu Kumar, Shreyas Jena, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2025-10-23 2025.10.23 文献データベース