Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Jinyuan Jia, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 Indirect Prompt InjectionBias Mitigation TechniquesVulnerability Prediction 2025.09.28 2025.10.03 Literature Database
Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 RAGSecurity Strategy GenerationEfficient Resolution of Learning Tasks 2025.09.28 2025.10.03 Literature Database
Measuring Physical-World Privacy Awareness of Large Language Models: An Evaluation Benchmark Authors: Xinjie Shen, Mufei Li, Pan Li | Published: 2025-09-27 | Updated: 2025-10-13 HallucinationPrivacy Enhancing Technology倫理的選択評価 2025.09.27 2025.10.15 Literature Database
MaskSQL: Safeguarding Privacy for LLM-Based Text-to-SQL via Abstraction Authors: Sepideh Abedini, Shubhankar Mohapatra, D. B. Emerson, Masoumeh Shafieinejad, Jesse C. Cresswell, Xi He | Published: 2025-09-27 | Updated: 2025-09-30 SQLクエリ生成Prompt InjectionPrompt leaking 2025.09.27 2025.10.02 Literature Database
LLM Watermark Evasion via Bias Inversion Authors: Jeongyeon Hwang, Sangdon Park, Jungseul Ok | Published: 2025-09-27 | Updated: 2025-10-01 Disabling Safety Mechanisms of LLMModel InversionStatistical Testing 2025.09.27 2025.10.03 Literature Database
Secure and Efficient Access Control for Computer-Use Agents via Context Space Authors: Haochen Gong, Chenxiao Li, Rui Chang, Wenbo Shen | Published: 2025-09-26 | Updated: 2025-10-21 Indirect Prompt Injectionエージェント設計Security Metric 2025.09.26 2025.10.23 Literature Database
Defending MoE LLMs against Harmful Fine-Tuning via Safety Routing Alignment Authors: Jaehan Kim, Minkyoo Song, Seungwon Shin, Sooel Son | Published: 2025-09-26 | Updated: 2025-10-09 Bias Detection in AI OutputRobustnessDefense Mechanism 2025.09.26 2025.10.11 Literature Database
Backdoor Attribution: Elucidating and Controlling Backdoor in Language Models Authors: Miao Yu, Zhenhong Zhou, Moayad Aloqaily, Kun Wang, Biwei Huang, Stephen Wang, Yueming Jin, Qingsong Wen | Published: 2025-09-26 | Updated: 2025-09-30 Disabling Safety Mechanisms of LLMSelf-Attention MechanismInterpretability 2025.09.26 2025.10.02 Literature Database
It’s not Easy: Applying Supervised Machine Learning to Detect Malicious Extensions in the Chrome Web Store Authors: Ben Rosenzweig, Valentino Dalla Valle, Giovanni Apruzzese, Aurore Fass | Published: 2025-09-25 | Updated: 2025-10-02 Program AnalysisUser Activity AnalysisMalicious Package Detection 2025.09.25 2025.10.04 Literature Database
No Prior, No Leakage: Revisiting Reconstruction Attacks in Trained Neural Networks Authors: Yehonatan Refael, Guy Smorodinsky, Ofir Lindenbaum, Itay Safran | Published: 2025-09-25 Training Data GenerationPrivacy Protection MechanismPrivacy Protection Method 2025.09.25 2025.09.27 Literature Database