Differentially Private Distribution Release of Gaussian Mixture Models via KL-Divergence Minimization Authors: Hang Liu, Anna Scaglione, Sean Peisert | Published: 2025-06-04 Anonymization TechnologyDifferential PrivacyOptimization Problem 2025.06.04 2025.06.06 Literature Database
ATAG: AI-Agent Application Threat Assessment with Attack Graphs Authors: Parth Atulbhai Gandhi, Akansha Shukla, David Tayouri, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai | Published: 2025-06-03 Indirect Prompt InjectionGraph ConstructionRisk Assessment 2025.06.03 2025.06.05 Literature Database
Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03 Privacy AnalysisAdversarial ExampleWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
Tarallo: Evading Behavioral Malware Detectors in the Problem Space Authors: Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero | Published: 2025-06-03 API SecurityDynamic Analysis MethodBehavior Analysis Method 2025.06.03 2025.06.05 Literature Database
CyberGym: Evaluating AI Agents’ Cybersecurity Capabilities with Real-World Vulnerabilities at Scale Authors: Zhun Wang, Tianneng Shi, Jingxuan He, Matthew Cai, Jialin Zhang, Dawn Song | Published: 2025-06-03 Prompt InjectionDynamic Analysis MethodWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
Attention Knows Whom to Trust: Attention-based Trust Management for LLM Multi-Agent Systems Authors: Pengfei He, Zhenwei Dai, Xianfeng Tang, Yue Xing, Hui Liu, Jingying Zeng, Qiankun Peng, Shrivats Agrawal, Samarth Varshney, Suhang Wang, Jiliang Tang, Qi He | Published: 2025-06-03 Indirect Prompt InjectionModel DoSEthical Considerations 2025.06.03 2025.06.05 Literature Database
BitBypass: A New Direction in Jailbreaking Aligned Large Language Models with Bitstream Camouflage Authors: Kalyan Nakka, Nitesh Saxena | Published: 2025-06-03 Disabling Safety Mechanisms of LLMDetection Rate of Phishing AttacksPrompt Injection 2025.06.03 2025.06.05 Literature Database
A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2025-06-03 Trigger DetectionIntrusion Detection SystemAnalysis of Detection Methods 2025.06.03 2025.06.05 Literature Database
MISLEADER: Defending against Model Extraction with Ensembles of Distilled Models Authors: Xueqi Cheng, Minxing Zheng, Shixiang Zhu, Yushun Dong | Published: 2025-06-03 Model Extraction AttackDetection of Model Extraction AttacksDefense Method 2025.06.03 2025.06.05 Literature Database
IF-GUIDE: Influence Function-Guided Detoxification of LLMs Authors: Zachary Coalson, Juhan Bae, Nicholas Carlini, Sanghyun Hong | Published: 2025-06-02 | Updated: 2025-06-09 Text DetoxificationEthical Statement影響関数 2025.06.02 2025.06.11 Literature Database