Quantum Autoencoder for Multivariate Time Series Anomaly Detection Authors: Kilian Tscharke, Maximilian Wendlinger, Afrae Ahouzi, Pallavi Bhardwaj, Kaweh Amoi-Taleghani, Michael Schrödl-Baumann, Pascal Debus | Published: 2025-04-24 多変量時系列分析異常検出手法量子計算手法 2025.04.24 2025.05.12 Literature Database
Automatically Generating Rules of Malicious Software Packages via Large Language Model Authors: XiangRui Zhang, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li | Published: 2025-04-24 OSSエコシステムの脅威プロンプトリーキングマルウェア検出手法 2025.04.24 2025.05.12 Literature Database
Steering the CensorShip: Uncovering Representation Vectors for LLM “Thought” Control Authors: Hannah Cyberey, David Evans | Published: 2025-04-23 プロンプトインジェクション心理的操作透かし 2025.04.23 2025.05.12 Literature Database
Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 ネットワーク脅威検出研究方法論透かし 2025.04.23 2025.05.12 Literature Database
MCMC for Bayesian estimation of Differential Privacy from Membership Inference Attacks Authors: Ceren Yildirim, Kamer Kaya, Sinan Yildirim, Erkay Savas | Published: 2025-04-23 プライバシー保護データマイニングメンバーシップ推論透かし 2025.04.23 2025.05.12 Literature Database
Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23 LLM性能評価トレーニング手法プロンプトリーキング 2025.04.23 2025.05.12 Literature Database
A Collaborative Intrusion Detection System Using Snort IDS Nodes Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23 ネットワーク脅威検出マルウェア検出手法透かし 2025.04.23 2025.05.12 Literature Database
Amplified Vulnerabilities: Structured Jailbreak Attacks on LLM-based Multi-Agent Debate Authors: Senmao Qi, Yifei Zou, Peng Li, Ziyi Lin, Xiuzhen Cheng, Dongxiao Yu | Published: 2025-04-23 インダイレクトプロンプトインジェクションマルチラウンド対話大規模言語モデル 2025.04.23 2025.05.12 Literature Database
Give LLMs a Security Course: Securing Retrieval-Augmented Code Generation via Knowledge Injection Authors: Bo Lin, Shangwen Wang, Yihao Qin, Liqian Chen, Xiaoguang Mao | Published: 2025-04-23 RAGへのポイズニング攻撃インダイレクトプロンプトインジェクションコード生成のセキュリティ 2025.04.23 2025.05.12 Literature Database
Automated Static Vulnerability Detection via a Holistic Neuro-symbolic Approach Authors: Penghui Li, Songchen Yao, Josef Sarfati Korich, Changhua Luo, Jianjia Yu, Yinzhi Cao, Junfeng Yang | Published: 2025-04-22 | Updated: 2025-04-23 クエリ生成手法プロンプトインジェクション脆弱性検出 2025.04.22 2025.05.12 Literature Database