NeuroStrike: Neuron-Level Attacks on Aligned LLMs Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-09-15 Prompt InjectionLarge Language Model安全性メカニズムの分析 2025.09.15 2025.09.17 Literature Database
An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15 AlgorithmMalware Classification攻撃戦略分析 2025.09.15 2025.09.17 Literature Database
Inducing Uncertainty for Test-Time Privacy Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15 AlgorithmData CurationModel evaluation methods 2025.09.15 2025.09.17 Literature Database
Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15 Algorithm脅威モデリング自動化Federated Learning 2025.09.15 2025.09.17 Literature Database
SoK: How Sensor Attacks Disrupt Autonomous Vehicles: An End-to-end Analysis, Challenges, and Missed Threats Authors: Qingzhao Zhang, Shaocheng Luo, Z. Morley Mao, Miroslav Pajic, Michael K. Reiter | Published: 2025-09-14 | Updated: 2025-09-16 システムエラープロパゲーションPrompt InjectionAttack Type 2025.09.14 2025.09.18 Literature Database
Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector Authors: Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirmare, Vivek Balachandran, Tamal Das | Published: 2025-09-11 AlgorithmData Collection MethodPhishing Detection 2025.09.11 2025.09.13 Literature Database
What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion Detection Datasets Authors: Meghan Wilkinson, Robert H Thomson | Published: 2025-09-11 AlgorithmNetwork ForensicsAnomaly Detection Algorithm 2025.09.11 2025.09.13 Literature Database
ENSI: Efficient Non-Interactive Secure Inference for Large Language Models Authors: Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu | Published: 2025-09-11 AlgorithmModel InversionEfficiency Evaluation 2025.09.11 2025.09.13 Literature Database
What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11 Vulnerabilities of IoT Devices形式モデルVulnerability Assessment Method 2025.09.11 2025.09.13 Literature Database
Enabling Regulatory Multi-Agent Collaboration: Architecture, Challenges, and Solutions Authors: Qinnan Hu, Yuntao Wang, Yuan Gao, Zhou Su, Linkang Du | Published: 2025-09-11 Relationship of AI Systems倫理基準遵守Anomaly Detection Method 2025.09.11 2025.09.13 Literature Database