Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic Shift Authors: Shuai Yuan, Zhibo Zhang, Yuxi Li, Guangdong Bai, Wang Kailong | Published: 2025-09-08 Disabling Safety Mechanisms of LLMCalculation of Output HarmfulnessAttack Detection Method 2025.09.08 2025.09.10 Literature Database
AttestLLM: Efficient Attestation Framework for Billion-scale On-device LLMs Authors: Ruisi Zhang, Yifei Zhao, Neusha Javidnia, Mengxin Zheng, Farinaz Koushanfar | Published: 2025-09-08 Security Strategy GenerationEfficiency EvaluationLarge Language Model 2025.09.08 2025.09.10 Literature Database
Exploit Tool Invocation Prompt for Tool Behavior Hijacking in LLM-Based Agentic System Authors: Yu Liu, Yuchong Xie, Mingyu Luo, Zesen Liu, Zhixiang Zhang, Kaikai Zhang, Zongjie Li, Ping Chen, Shuai Wang, Dongdong She | Published: 2025-09-06 | Updated: 2025-09-15 Prompt InjectionModel DoSAttack Evaluation 2025.09.06 2025.09.17 Literature Database
Self-adaptive Dataset Construction for Real-World Multimodal Safety Scenarios Authors: Jingen Qu, Lijun Li, Bo Zhang, Yichen Yan, Jing Shao | Published: 2025-09-04 Prompt InjectionRisk Analysis Method安全性評価手法 2025.09.04 2025.09.06 Literature Database
An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline Authors: Tyler Shumaker, Jessica Carpenter, David Saranchak, Nathaniel D. Bastian | Published: 2025-09-04 Model InversionModel Extraction AttackRisk Analysis Method 2025.09.04 2025.09.06 Literature Database
KubeGuard: LLM-Assisted Kubernetes Hardening via Configuration Files and Runtime Logs Analysis Authors: Omri Sgan Cohen, Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai | Published: 2025-09-04 Security Strategy GenerationNetwork Forensics監査ログ分析 2025.09.04 2025.09.06 Literature Database
NeuroBreak: Unveil Internal Jailbreak Mechanisms in Large Language Models Authors: Chuhan Zhang, Ye Zhang, Bowen Shi, Yuyou Gan, Tianyu Du, Shouling Ji, Dazhan Deng, Yingcai Wu | Published: 2025-09-04 Prompt Injection神経細胞と安全性Defense Mechanism 2025.09.04 2025.09.06 Literature Database
Federated Learning: An approach with Hybrid Homomorphic Encryption Authors: Pedro Correia, Ivan Silva, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-09-03 Integration of FL and HEPrivacy Design PrinciplesFederated Learning 2025.09.03 2025.09.05 Literature Database
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities Authors: Weizhe Wang, Wei Ma, Qiang Hu, Yao Zhang, Jianfei Sun, Bin Wu, Yang Liu, Guangquan Xu, Lingxiao Jiang | Published: 2025-09-03 Prompt InjectionLarge Language ModelVulnerability Analysis 2025.09.03 2025.09.05 Literature Database
A Comprehensive Guide to Differential Privacy: From Theory to User Expectations Authors: Napsu Karmitsa, Antti Airola, Tapio Pahikkala, Tinja Pitkämäki | Published: 2025-09-03 Detection of Poison Data for Backdoor AttacksPrivacy Design PrinciplesDifferential Privacy 2025.09.03 2025.09.05 Literature Database