FlowPure: Continuous Normalizing Flows for Adversarial Purification Authors: Elias Collaert, Abel Rodríguez, Sander Joos, Lieven Desmet, Vera Rimmer | Published: 2025-05-19 Robustness Improvement MethodAdversarial LearningEffectiveness Analysis of Defense Methods 2025.05.19 2025.05.28 Literature Database
Fixing 7,400 Bugs for 1$: Cheap Crash-Site Program Repair Authors: Han Zheng, Ilia Shumailov, Tianqi Fan, Aiden Hall, Mathias Payer | Published: 2025-05-19 LLM Securityバグ修正手法Watermarking Technology 2025.05.19 2025.05.28 Literature Database
The Hidden Dangers of Browsing AI Agents Authors: Mykyta Mudryi, Markiyan Chaklosh, Grzegorz Wójcik | Published: 2025-05-19 LLM SecurityIndirect Prompt InjectionAttack Method 2025.05.19 2025.05.28 Literature Database
Evaluating the efficacy of LLM Safety Solutions : The Palit Benchmark Dataset Authors: Sayon Palit, Daniel Woods | Published: 2025-05-19 | Updated: 2025-05-20 LLM SecurityPrompt InjectionAttack Method 2025.05.19 2025.05.28 Literature Database
From Assistants to Adversaries: Exploring the Security Risks of Mobile LLM Agents Authors: Liangxuan Wu, Chao Wang, Tianming Liu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-19 | Updated: 2025-05-20 LLM SecurityIndirect Prompt InjectionAttack Method 2025.05.19 2025.05.28 Literature Database
Does Low Rank Adaptation Lead to Lower Robustness against Training-Time Attacks? Authors: Zi Liang, Haibo Hu, Qingqing Ye, Yaxin Xiao, Ronghua Li | Published: 2025-05-19 LLM SecurityPoisoning Attackrobustness requirements 2025.05.19 2025.05.28 Literature Database
Malware families discovery via Open-Set Recognition on Android manifest permissions Authors: Filippo Leveni, Matteo Mistura, Francesco Iubatti, Carmine Giangregorio, Nicolò Pastore, Cesare Alippi, Giacomo Boracchi | Published: 2025-05-19 Online Malware DetectionDataset for Malware ClassificationMalware Detection Method 2025.05.19 2025.05.28 Literature Database
Web IP at Risk: Prevent Unauthorized Real-Time Retrieval by Large Language Models Authors: Yisheng Zhong, Yizhu Wen, Junfeng Guo, Mehran Kafai, Heng Huang, Hanqing Guo, Zhuangdi Zhu | Published: 2025-05-19 LLM SecurityIndirect Prompt InjectionPrivacy Management 2025.05.19 2025.05.28 Literature Database
R1dacted: Investigating Local Censorship in DeepSeek’s R1 Language Model Authors: Ali Naseh, Harsh Chaudhari, Jaechul Roh, Mingshi Wu, Alina Oprea, Amir Houmansadr | Published: 2025-05-19 Bias Detection in AI OutputPrompt leaking検閲行動 2025.05.19 2025.05.28 Literature Database
IP Leakage Attacks Targeting LLM-Based Multi-Agent Systems Authors: Liwen Wang, Wenxuan Wang, Shuai Wang, Zongjie Li, Zhenlan Ji, Zongyi Lyu, Daoyuan Wu, Shing-Chi Cheung | Published: 2025-05-18 | Updated: 2025-05-20 Indirect Prompt InjectionPrivacy Leakage情報伝播手法 2025.05.18 2025.05.28 Literature Database