From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction

Authors: Ahmed Lekssays, Husrev Taha Sencar, Ting Yu | Published: 2025-07-22

Depth Gives a False Sense of Privacy: LLM Internal States Inversion

Authors: Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, Zhen Liu, Haojin Zhu | Published: 2025-07-22

Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers

Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-22

eX-NIDS: A Framework for Explainable Network Intrusion Detection Leveraging Large Language Models

Authors: Paul R. B. Houssel, Siamak Layeghy, Priyanka Singh, Marius Portmann | Published: 2025-07-22

Distilled Large Language Model in Confidential Computing Environment for System-on-Chip Design

Authors: Dong Ben, Hui Feng, Qian Wang | Published: 2025-07-22

Attacking interpretable NLP systems

Authors: Eldor Abdukhamidov, Tamer Abuhmed, Joanna C. S. Santos, Mohammed Abuhamad | Published: 2025-07-22

DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT

Authors: Baofu Han, Bing Li, Yining Qi, Raja Jurdak, Kaibin Huang, Chau Yuen | Published: 2025-07-22

Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems

Authors: Andrii Balashov, Olena Ponomarova, Xiaohua Zhai | Published: 2025-07-21

PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation

Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-21

PiMRef: Detecting and Explaining Ever-evolving Spear Phishing Emails with Knowledge Base Invariants

Authors: Ruofan Liu, Yun Lin, Silas Yeo Shuen Yu, Xiwen Teoh, Zhenkai Liang, Jin Song Dong | Published: 2025-07-21