PiMRef: Detecting and Explaining Ever-evolving Spear Phishing Emails with Knowledge Base Invariants Authors: Ruofan Liu, Yun Lin, Silas Yeo Shuen Yu, Xiwen Teoh, Zhenkai Liang, Jin Song Dong | Published: 2025-07-21 Social Engineering AttackBusiness Email CompromiseFeature Extraction 2025.07.21 2025.07.23 Literature Database
Fake or Real: The Impostor Hunt in Texts for Space Operations Authors: Agata Kaczmarek, Dawid Płudowski, Piotr Wilczyński, Przemysław Biecek, Krzysztof Kotowski, Ramez Shendy, Jakub Nalepa, Artur Janicki, Evridiki Ntagiou | Published: 2025-07-17 | Updated: 2025-07-21 データ毒性Detection of MisinformationCalculation of Output Harmfulness 2025.07.17 2025.07.23 Literature Database
A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17 IoT Data Analysis TaskPerformance Evaluation MethodFeature Extraction 2025.07.17 2025.07.19 Literature Database
MAD-Spear: A Conformity-Driven Prompt Injection Attack on Multi-Agent Debate Systems Authors: Yu Cui, Hongyang Du | Published: 2025-07-17 Security Strategy GenerationPrompt leakingAttacker Behavior Analysis 2025.07.17 2025.07.19 Literature Database
Thought Purity: Defense Paradigm For Chain-of-Thought Attack Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16 Information SecurityThreat modelingDefense Method 2025.07.16 2025.07.18 Literature Database
LLAMA: Multi-Feedback Smart Contract Fuzzing Framework with LLM-Guided Seed Generation Authors: Keke Gai, Haochen Liang, Jing Yu, Liehuang Zhu, Dusit Niyato | Published: 2025-07-16 Prompt InjectionInitial Seed GenerationPerformance Evaluation Metrics 2025.07.16 2025.07.18 Literature Database
From Semantic Web and MAS to Agentic AI: A Unified Narrative of the Web of Agents Authors: Tatiana Petrova, Boris Bliznioukov, Aleksandr Puzikov, Radu State | Published: 2025-07-14 | Updated: 2025-07-16 AIエージェントの相互作用RAG標準化と相互運用性 2025.07.14 2025.07.18 Literature Database
ARMOR: Aligning Secure and Safe Large Language Models via Meticulous Reasoning Authors: Zhengyue Zhao, Yingzi Ma, Somesh Jha, Marco Pavone, Patrick McDaniel, Chaowei Xiao | Published: 2025-07-14 | Updated: 2025-10-20 Large Language Model安全性分析評価基準 2025.07.14 2025.10.22 Literature Database
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents Authors: Lixu Wang, Kaixiang Yao, Xinfeng Li, Dong Yang, Haoyang Li, Xiaofeng Wang, Wei Dong | Published: 2025-07-14 | Updated: 2025-08-20 Privacy Design PrinciplesPrompt leakingSecurity of Voice Recognition Systems 2025.07.14 2025.08.22 Literature Database
AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models Authors: Yu Wang, Yijian Liu, Liheng Ji, Han Luo, Wenjie Li, Xiaofei Zhou, Chiyun Feng, Puji Wang, Yuhan Cao, Geyuan Zhang, Xiaojian Li, Rongwu Xu, Yilei Chen, Tianxing He | Published: 2025-07-13 | Updated: 2025-09-30 AlgorithmHallucinationPrompt validation 2025.07.13 2025.10.02 Literature Database