PromptLocate: Localizing Prompt Injection Attacks Authors: Yuqi Jia, Yupei Liu, Zedian Shao, Jinyuan Jia, Neil Gong | Published: 2025-10-14 Prompt validationLarge Language Modelevaluation metrics 2025.10.14 2025.10.16 Literature Database
Fairness-Constrained Optimization Attack in Federated Learning Authors: Harsh Kasyap, Minghong Fang, Zhuqing Liu, Carsten Maple, Somanath Tripathy | Published: 2025-10-14 Trigger DetectionBiasFederated Learning 2025.10.14 2025.10.16 Literature Database
PACEbench: A Framework for Evaluating Practical AI Cyber-Exploitation Capabilities Authors: Zicheng Liu, Lige Huang, Jie Zhang, Dongrui Liu, Yuan Tian, Jing Shao | Published: 2025-10-13 Security Analysis MethodLarge Language ModelDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Uncertainty-Aware, Risk-Adaptive Access Control for Agentic Systems using an LLM-Judged TBAC Model Authors: Charles Fleming, Ashish Kundu, Ramana Kompella | Published: 2025-10-13 Risk ManagementUncertainty AssessmentDecision-Making Dynamics 2025.10.13 2025.10.15 Literature Database
Large Language Models Are Effective Code Watermarkers Authors: Rui Xu, Jiawei Chen, Zhaoxia Yin, Cong Kong, Xinpeng Zhang | Published: 2025-10-13 Prompt leakingRobustnessDigital Watermarking for Generative AI 2025.10.13 2025.10.15 Literature Database
Evaluating Line-level Localization Ability of Learning-based Code Vulnerability Detection Models Authors: Marco Pintore, Giorgio Piras, Angelo Sotgiu, Maura Pintor, Battista Biggio | Published: 2025-10-13 Program UnderstandingFeature Importance AnalysisAttacks on Explainability 2025.10.13 2025.10.15 Literature Database
TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code Authors: Alexander Sternfeld, Andrei Kucharavy, Ljiljana Dolamic | Published: 2025-10-13 Indirect Prompt InjectionSecurity Analysis MethodPrompt leaking 2025.10.13 2025.10.15 Literature Database
CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense Authors: Yang Zhuochen, Fok Kar Wai, Thing Vrizlynn | Published: 2025-10-13 Privacy Enhancing TechnologyImprovement of LearningDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Secret-Protected Evolution for Differentially Private Synthetic Text Generation Authors: Tianze Wang, Zhaoyu Chen, Jian Du, Yingtai Xiao, Linjun Zhang, Qiang Yan | Published: 2025-10-13 Data Protection MethodPrivacy Enhancing TechnologyDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Adversarial Robustness in One-Stage Learning-to-Defer Authors: Yannis Montreuil, Letian Yu, Axel Carlier, Lai Xing Ng, Wei Tsang Ooi | Published: 2025-10-13 RobustnessAdversarial LearningDefense Mechanism 2025.10.13 2025.10.15 Literature Database