Secure Sparse Matrix Multiplications and their Applications to Privacy-Preserving Machine Learning Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2025-10-16 Data ProtectionPrivacy-Preserving Machine LearningDifferential Privacy 2025.10.16 2025.10.18 Literature Database
LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet? Authors: Bin Liu, Yanjie Zhao, Guoai Xu, Haoyu Wang | Published: 2025-10-16 Indirect Prompt Injectionエージェント設計Security Analysis 2025.10.16 2025.10.18 Literature Database
Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration Authors: Evangelos Lamprou, Julian Dai, Grigoris Ntousakis, Martin C. Rinard, Nikos Vasilakis | Published: 2025-10-16 Security AnalysisProgram VerificationPrompt leaking 2025.10.16 2025.10.18 Literature Database
Are My Optimized Prompts Compromised? Exploring Vulnerabilities of LLM-based Optimizers Authors: Andrew Zhao, Reshmi Ghosh, Vitor Carvalho, Emily Lawton, Keegan Hines, Gao Huang, Jack W. Stokes | Published: 2025-10-16 Prompt InjectionPrompt leakingLarge Language Model 2025.10.16 2025.10.18 Literature Database
Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy, and Security Studies Authors: Mason Nakamura, Abhinav Kumar, Saaduddin Mahmud, Sahar Abdelnabi, Shlomo Zilberstein, Eugene Bagdasarian | Published: 2025-10-16 エージェント設計Large Language Model通信プロトコル 2025.10.16 2025.10.18 Literature Database
RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models Authors: Fanchao Meng, Jiaping Gui, Yunbo Li, Yue Wu | Published: 2025-10-16 Network Traffic AnalysisBackdoor DetectionEvaluation Method 2025.10.16 2025.10.18 Literature Database
In-Browser LLM-Guided Fuzzing for Real-Time Prompt Injection Testing in Agentic AI Browsers Authors: Avihay Cohen | Published: 2025-10-15 Indirect Prompt InjectionLarge Language Model自動生成フレームワーク 2025.10.15 2025.10.17 Literature Database
Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored Mixture-of-Experts Transformers Authors: Xin Zhao, Xiaojun Chen, Bingshan Liu, Haoyu Gao, Zhendong Zhao, Yilong Chen | Published: 2025-10-15 Backdoor DetectionPrompt leakingLarge Language Model 2025.10.15 2025.10.17 Literature Database
Toward Efficient Inference Attacks: Shadow Model Sharing via Mixture-of-Experts Authors: Li Bai, Qingqing Ye, Xinwei Zhang, Sen Zhang, Zi Liang, Jianliang Xu, Haibo Hu | Published: 2025-10-15 Trigger DetectionModel Architecture攻撃モデルの訓練 2025.10.15 2025.10.17 Literature Database
Injection, Attack and Erasure: Revocable Backdoor Attacks via Machine Unlearning Authors: Baogang Song, Dongdong Zhao, Jianwen Xiang, Qiben Xu, Zizhuo Yu | Published: 2025-10-15 Backdoor AttackModel Protection MethodsDefense Mechanism 2025.10.15 2025.10.17 Literature Database