The Steganographic Potentials of Language Models Authors: Artem Karpov, Tinuade Adeleke, Seong Hah Cho, Natalia Perez-Campanero | Published: 2025-05-06 RAG著者貢献透かし 2025.05.06 2025.05.12 Literature Database
Directed Greybox Fuzzing via Large Language Model Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06 RAGプロンプトインジェクション脆弱性分析 2025.05.06 2025.05.12 Literature Database
Elevating Cyber Threat Intelligence against Disinformation Campaigns with LLM-based Concept Extraction and the FakeCTI Dataset Authors: Domenico Cotroneo, Roberto Natella, Vittorio Orbinato | Published: 2025-05-06 AIによる出力のバイアスの検出偽情報の検出情報抽出手法 2025.05.06 2025.05.12 Literature Database
Bridging Expertise Gaps: The Role of LLMs in Human-AI Collaboration for Cybersecurity Authors: Shahroz Tariq, Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris | Published: 2025-05-06 LLMとの協力効果アライメント参加者の質問分析 2025.05.06 2025.05.12 Literature Database
An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks Authors: Qi Qin, Xinye Cao, Guoshun Nan, Sihan Chen, Rushan Li, Li Su, Haitao Du, Qimei Cui, Pengxuan Mao, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-05-06 | Updated: 2025-05-07 RAGへのポイズニング攻撃セキュリティ戦略生成自己進化型フレームワーク 2025.05.06 2025.05.12 Literature Database
Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo | Published: 2025-05-06 プロンプトリーキング攻撃タイプ攻撃の分類 2025.05.06 2025.05.12 Literature Database
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06 攻撃タイプ敵対的サンプル機械学習技術 2025.05.06 2025.05.12 Literature Database
Towards a standardized methodology and dataset for evaluating LLM-based digital forensic timeline analysis Authors: Hudan Studiawan, Frank Breitinger, Mark Scanlon | Published: 2025-05-06 LLM性能評価大規模言語モデル評価手法 2025.05.06 2025.05.12 Literature Database
Acoustic Side-Channel Attacks on a Computer Mouse Authors: Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik | Published: 2025-05-05 ユーザー行動の変化機械学習技術音声認識システム 2025.05.05 2025.05.12 Literature Database
Unveiling the Landscape of LLM Deployment in the Wild: An Empirical Study Authors: Xinyi Hou, Jiahao Han, Yanjie Zhao, Haoyu Wang | Published: 2025-05-05 APIセキュリティインダイレクトプロンプトインジェクションプロンプトリーキング 2025.05.05 2025.05.12 Literature Database