GRAPHTEXTACK: A Realistic Black-Box Node Injection Attack on LLM-Enhanced GNNs Authors: Jiaji Ma, Puja Trivedi, Danai Koutra | Published: 2025-11-16 2025.11.16 2025.11.18 Literature Database
The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16 2025.11.16 2025.11.18 Literature Database
Large Language Models for Cyber Security Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06 2025.11.06 2025.11.08 Literature Database
Adversarially Robust and Interpretable Magecart Malware Detection Authors: Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça | Published: 2025-11-06 2025.11.06 2025.11.08 Literature Database
Differentially Private In-Context Learning with Nearest Neighbor Search Authors: Antti Koskela, Tejas Kulkarni, Laith Zumot | Published: 2025-11-06 2025.11.06 2025.11.08 Literature Database
Black-Box Guardrail Reverse-engineering Attack Authors: Hongwei Yao, Yun Xia, Shuo Shao, Haoran Shi, Tong Qiao, Cong Wang | Published: 2025-11-06 2025.11.06 2025.11.08 Literature Database
Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems Authors: Paul Badu Yakubu, Lesther Santana, Mohamed Rahouti, Yufeng Xin, Abdellah Chehri, Mohammed Aledhari | Published: 2025-11-06 2025.11.06 2025.11.08 Literature Database
Specification-Guided Vulnerability Detection with Large Language Models Authors: Hao Zhu, Jia Li, Cuiyun Gao, Jiaru Qian, Yihong Dong, Huanyu Liu, Lecheng Wang, Ziliang Wang, Xiaolong Hu, Ge Li | Published: 2025-11-06 2025.11.06 2025.11.08 Literature Database
Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback Authors: Shiyin Lin | Published: 2025-11-06 2025.11.06 2025.11.08 Literature Database
Whisper Leak: a side-channel attack on Large Language Models Authors: Geoff McDonald, Jonathan Bar Or | Published: 2025-11-05 2025.11.05 2025.11.07 Literature Database