Training Language Model Agents to Find Vulnerabilities with CTF-Dojo Authors: Terry Yue Zhuo, Dingmin Wang, Hantian Ding, Varun Kumar, Zijian Wang | Published: 2025-08-25 | Updated: 2025-09-23 Security AnalysisMachine Learning Application競技チャレンジ分析 2025.08.25 2025.09.25 Literature Database
$AutoGuardX$: A Comprehensive Cybersecurity Framework for Connected Vehicles Authors: Muhammad Ali Nadeem, Bishwo Prakash Pokharel, Naresh Kshetri, Achyut Shankar, Gokarna Sharma | Published: 2025-08-25 Hardware Security自動車盗難防止製品安全性 2025.08.25 2025.08.27 Literature Database
Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25 Data Generation MethodTraining MethodWatermark 2025.08.25 2025.08.27 Literature Database
MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs Authors: Tiezhu Sun, Marco Alecci, Aleksandr Pilgun, Yewei Song, Xunzhu Tang, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-08-25 Program Analysisマルウェア分析マルチエージェントシステム 2025.08.25 2025.08.27 Literature Database
Confusion is the Final Barrier: Rethinking Jailbreak Evaluation and Investigating the Real Misuse Threat of LLMs Authors: Yu Yan, Sheng Sun, Zhe Wang, Yijun Lin, Zenghao Duan, zhifei zheng, Min Liu, Zhiyi yin, Jianping Zhang | Published: 2025-08-22 | Updated: 2025-09-15 Privacy Assessment倫理基準遵守Large Language Model 2025.08.22 2025.09.17 Literature Database
Evaluating the Defense Potential of Machine Unlearning against Membership Inference Attacks Authors: Aristeidis Sidiropoulos, Christos Chrysanthos Nikolaidis, Theodoros Tsiolakis, Nikolaos Pavlidis, Vasilis Perifanis, Pavlos S. Efraimidis | Published: 2025-08-22 | Updated: 2025-09-17 AlgorithmPrivacy AnalysisEvaluation Method 2025.08.22 2025.09.19 Literature Database
A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives Authors: Kaixiang Zhao, Lincan Li, Kaize Ding, Neil Zhenqiang Gong, Yue Zhao, Yushun Dong | Published: 2025-08-20 | Updated: 2025-08-27 Model Extraction AttackIntellectual Property Protection防御手法の統合 2025.08.20 2025.08.29 Literature Database
Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20 Certified RobustnessRobustness Improvement MethodEvaluation Method 2025.08.20 2025.08.22 Literature Database
On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions Authors: Daniel M. Jimenez-Gutierrez, Yelizaveta Falkouskaya, Jose L. Hernandez-Ramos, Aris Anagnostopoulos, Ioannis Chatzigiannakis, Andrea Vitaletti | Published: 2025-08-19 Privacy Design PrinciplesPoisoningDetection of Poisonous Data 2025.08.19 2025.08.21 Literature Database
DDoS Attacks in Cloud Computing: Detection and Prevention Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19 Resource Usage AnalysisAttack TypeDefense Method 2025.08.19 2025.08.21 Literature Database