Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05 Reinforcement Learning AttackAttack Action ModelWatermark 2025.08.05 2025.08.07 Literature Database
VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs Authors: Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye | Published: 2025-08-05 Prompt InjectionPrompt leakingWatermark 2025.08.05 2025.08.07 Literature Database
Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04 RAGTraffic SimulationWatermark 2025.08.04 2025.08.06 Literature Database
SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04 Blockchain StrategyVulnerability AnalysisWatermark 2025.08.04 2025.08.06 Literature Database
A Survey on Data Security in Large Language Models Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04 Indirect Prompt InjectionPrompt leakingWatermark 2025.08.04 2025.08.06 Literature Database
FPEdit: Robust LLM Fingerprinting through Localized Knowledge Editing Authors: Shida Wang, Chaohu Liu, Yubo Wang, Linli Xu | Published: 2025-08-04 DeepfakeDigital Watermarking for Generative AIWatermark 2025.08.04 2025.08.06 Literature Database
PhishParrot: LLM-Driven Adaptive Crawling to Unveil Cloaked Phishing Sites Authors: Hiroki Nakano, Takashi Koide, Daiki Chiba | Published: 2025-08-04 Indirect Prompt InjectionPrompt InjectionMalicious Website Detection 2025.08.04 2025.08.06 Literature Database
ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models Authors: Zihan Wang, Rui Zhang, Hongwei Li, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Guowen Xu | Published: 2025-08-02 | Updated: 2025-08-05 Backdoor DetectionBackdoor Attack TechniquesModel DoS 2025.08.02 2025.08.07 Literature Database
BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability Authors: Zhenhua Zou, Zhuotao Liu, Lepeng Zhao, Qiuyang Zhan | Published: 2025-08-02 | Updated: 2025-08-05 DID文書構築Trust EvaluationWatermark 2025.08.02 2025.08.07 Literature Database
LLM-Based Identification of Infostealer Infection Vectors from Screenshots: The Case of Aurora Authors: Estelle Ruellan, Eric Clay, Nicholas Ascoli | Published: 2025-07-31 Indirect Prompt InjectionUser Behavior AnalysisMalicious Website Detection 2025.07.31 2025.08.02 Literature Database