Neutral Agent-based Adversarial Policy Learning against Deep Reinforcement Learning in Multi-party Open Systems Authors: Qizhou Peng, Yang Zheng, Yu Wen, Yanna Wu, Yingying Du | Published: 2025-10-13 Adversarial LearningDeep Reinforcement LearningDefense Effectiveness Analysis 2025.10.13 2025.10.15 Literature Database
Quantifying Information Disclosure During Gradient Descent Using Gradient Uniqueness Authors: Mahmoud Abdelghafar, Maryam Aliakbarpour, Chris Jermaine | Published: 2025-10-13 Privacy Enhancing TechnologyModel Protection Methods情報理論的関係 2025.10.13 2025.10.15 Literature Database
New Machine Learning Approaches for Intrusion Detection in ADS-B Authors: Mikaëla Ngamboé, Jean-Simon Marrocco, Jean-Yves Ouattara, José M. Fernandez, Gabriela Nicolescu | Published: 2025-10-09 Backdoor DetectionPerformance Evaluation Metrics通信セキュリティ 2025.10.09 2025.10.11 Literature Database
LLM-Assisted Web Measurements Authors: Simone Bozzolan, Stefano Calzavara, Lorenzo Cazzaro | Published: 2025-10-09 Bias Detection in AI OutputApplication Classification MethodPrompt Injection 2025.10.09 2025.10.11 Literature Database
A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems Authors: Hikmat A. M. Abdeljaber, Md. Alamgir Hossain, Sultan Ahmad, Ahmed Alsanad, Md Alimul Haque, Sudan Jha, Jabeen Nazeer | Published: 2025-10-09 IoT Security ChallengesDefense MechanismDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database
Fewer Weights, More Problems: A Practical Attack on LLM Pruning Authors: Kazuki Egashira, Robin Staab, Thibaud Gloaguen, Mark Vero, Martin Vechev | Published: 2025-10-09 Security Analysis MethodPrompt InjectionDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses Authors: Xiangtao Meng, Tianshuo Cong, Li Wang, Wenyu Chen, Zheng Li, Shanqing Guo, Xiaoyun Wang | Published: 2025-10-09 AlignmentIndirect Prompt InjectionDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database
MetaDefense: Defending Finetuning-based Jailbreak Attack Before and During Generation Authors: Weisen Jiang, Sinno Jialin Pan | Published: 2025-10-09 Prompt InjectionRobustnessDefense Mechanism 2025.10.09 2025.10.11 Literature Database
Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs Authors: Man Hu, Xinyi Wu, Zuofeng Suo, Jinbo Feng, Linghui Meng, Yanhao Jia, Anh Tuan Luu, Shuai Zhao | Published: 2025-10-09 Prompt leaking推論に基づくバックドア攻撃Defense Method 2025.10.09 2025.10.11 Literature Database
Proactive defense against LLM Jailbreak Authors: Weiliang Zhao, Jinjun Peng, Daniel Ben-Levi, Zhou Yu, Junfeng Yang | Published: 2025-10-06 Disabling Safety Mechanisms of LLMPrompt Injection防御手法の統合 2025.10.06 2025.10.08 Literature Database