Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent Authors: Philip Doldo, Derek Everett, Amol Khanna, Andre T Nguyen, Edward Raff | Published: 2025-03-25 Vulnerability of Adversarial ExamplesAdversarial LearningRobustness of Deep Networks 2025.03.25 2025.05.12 Literature Database
Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking Authors: Sheikh Muhammad Farjad, Sandeep Reddy Patllola, Yonas Kassa, George Grispos, Robin Gandhi | Published: 2025-03-24 Edge ComputingCloud ComputingResource Usage Analysis 2025.03.24 2025.05.12 Literature Database
Defeating Prompt Injections by Design Authors: Edoardo Debenedetti, Ilia Shumailov, Tianqi Fan, Jamie Hayes, Nicholas Carlini, Daniel Fabian, Christoph Kern, Chongyang Shi, Andreas Terzis, Florian Tramèr | Published: 2025-03-24 Indirect Prompt InjectionPrompt Injection 2025.03.24 2025.05.12 Literature Database
Leveraging VAE-Derived Latent Spaces for Enhanced Malware Detection with Machine Learning Classifiers Authors: Bamidele Ajayi, Basel Barakat, Ken McGarry | Published: 2025-03-24 | Updated: 2025-04-30 Malware ClassificationFactors of Performance DegradationMachine Learning Technology 2025.03.24 2025.05.12 Literature Database
Large Language Models powered Network Attack Detection: Architecture, Opportunities and Case Study Authors: Xinggong Zhang, Qingyang Li, Yunpeng Tan, Zongming Guo, Lei Zhang, Yong Cui | Published: 2025-03-24 Prompt InjectionPrompt leakingIntrusion Detection System 2025.03.24 2025.05.12 Literature Database
Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection Authors: Fei Zuo, Junghwan Rhee, Yung Ryn Choe | Published: 2025-03-24 Cyber Threat IntelligencePrompt InjectionInformation Extraction 2025.03.24 2025.05.12 Literature Database
Model-Guardian: Protecting against Data-Free Model Stealing Using Gradient Representations and Deceptive Predictions Authors: Yunfei Yang, Xiaojun Chen, Yuexin Xuan, Zhendong Zhao | Published: 2025-03-23 Model Extraction AttackMalicious ClientDefense Effectiveness Analysis 2025.03.23 2025.05.12 Literature Database
STShield: Single-Token Sentinel for Real-Time Jailbreak Detection in Large Language Models Authors: Xunguang Wang, Wenxuan Wang, Zhenlan Ji, Zongjie Li, Pingchuan Ma, Daoyuan Wu, Shuai Wang | Published: 2025-03-23 Prompt InjectionMalicious PromptEffectiveness Analysis of Defense Methods 2025.03.23 2025.05.12 Literature Database
NVBleed: Covert and Side-Channel Attacks on NVIDIA Multi-GPU Interconnect Authors: Yicheng Zhang, Ravan Nazaraliyev, Sankha Baran Dutta, Andres Marquez, Kevin Barker, Nael Abu-Ghazaleh | Published: 2025-03-22 Cloud ComputingSide-Channel AttackAttack Method 2025.03.22 2025.05.12 Literature Database
Language Models May Verbatim Complete Text They Were Not Explicitly Trained On Authors: Ken Ziyu Liu, Christopher A. Choquette-Choo, Matthew Jagielski, Peter Kairouz, Sanmi Koyejo, Percy Liang, Nicolas Papernot | Published: 2025-03-21 | Updated: 2025-03-25 RAGMembership Disclosure RiskAdversarial attack 2025.03.21 2025.05.12 Literature Database