Position: LLM Watermarking Should Align Stakeholders’ Incentives for Practical Adoption Authors: Yepeng Liu, Xuandong Zhao, Dawn Song, Gregory W. Wornell, Yuheng Bu | Published: 2025-10-21 Incentive MechanismDigital Watermarking for Generative AIRobustness of Watermarking Techniques 2025.10.21 2025.10.23 Literature Database
RESCUE: Retrieval Augmented Secure Code Generation Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21 Poisoning attack on RAGData-Driven Vulnerability AssessmentPrompt leaking 2025.10.21 2025.10.23 Literature Database
VERA-V: Variational Inference Framework for Jailbreaking Vision-Language Models Authors: Qilin Liao, Anamika Lochab, Ruqi Zhang | Published: 2025-10-20 Model DoSLarge Language ModelUntargeted Toxicity Attack 2025.10.20 2025.10.22 Literature Database
CrossGuard: Safeguarding MLLMs against Joint-Modal Implicit Malicious Attacks Authors: Xu Zhang, Hao Li, Zhichao Lu | Published: 2025-10-20 Query Generation MethodPrompt InjectionLarge Language Model 2025.10.20 2025.10.22 Literature Database
GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with Denoising Models Authors: Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento | Published: 2025-10-20 Privacy AnalysisReconstruction AttackFederated Learning 2025.10.20 2025.10.22 Literature Database
Multimodal Safety Is Asymmetric: Cross-Modal Exploits Unlock Black-Box MLLMs Jailbreaks Authors: Xinkai Wang, Beibei Li, Zerui Shao, Ao Liu, Shouling Ji | Published: 2025-10-20 Disabling Safety Mechanisms of LLMPrompt InjectionMalicious Content Generation 2025.10.20 2025.10.22 Literature Database
Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography Authors: Giulia Giusti | Published: 2025-10-20 Encryption TechnologyWatermark DesignQuantum Computing Method 2025.10.20 2025.10.22 Literature Database
QRïS: A Preemptive Novel Method for Quishing Detection Through Structural Features of QR Authors: Muhammad Wahid Akram, Keshav Sood, Muneeb Ul Hassan | Published: 2025-10-20 QRコード分類手法Feature Importance Analysis評価メトリクス 2025.10.20 2025.10.22 Literature Database
SentinelNet: Safeguarding Multi-Agent Collaboration Through Credit-Based Dynamic Threat Detection Authors: Yang Feng, Xudong Pan | Published: 2025-10-17 | Updated: 2025-10-21 エージェント設計Network Threat DetectionModel Robustness 2025.10.17 2025.10.23 Literature Database
SoK: Taxonomy and Evaluation of Prompt Security in Large Language Models Authors: Hanbin Hong, Shuya Feng, Nima Naderloui, Shenao Yan, Jingyu Zhang, Biying Liu, Ali Arastehfard, Heqing Huang, Yuan Hong | Published: 2025-10-17 | Updated: 2025-10-21 LLM Securityシナリオベースの悪用Large Language Model 2025.10.17 2025.10.23 Literature Database