Empirical Evaluation of Concept Drift in ML-Based Android Malware Detection Authors: Ahmed Sabbah, Radi Jarrar, Samer Zein, David Mohaisen | Published: 2025-07-30 2025.07.30 2025.08.01 Literature Database
Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection Authors: Zhihong Liang, Xin Wang, Zhenhuang Hu, Liangliang Song, Lin Chen, Jingjing Guo, Yanbin Wang, Ye Tian | Published: 2025-07-30 2025.07.30 2025.08.01 Literature Database
SAEL: Leveraging Large Language Models with Adaptive Mixture-of-Experts for Smart Contract Vulnerability Detection Authors: Lei Yu, Shiqi Cheng, Zhirong Huang, Jingyuan Zhang, Chenjie Shen, Junyi Lu, Li Yang, Fengjun Zhang, Jiajia Ma | Published: 2025-07-30 2025.07.30 2025.08.01 Literature Database
Secure Tug-of-War (SecTOW): Iterative Defense-Attack Training with Reinforcement Learning for Multimodal Model Security Authors: Muzhi Dai, Shixuan Liu, Zhiyuan Zhao, Junyu Gao, Hao Sun, Xuelong Li | Published: 2025-07-29 2025.07.29 2025.07.31 Literature Database
Can We End the Cat-and-Mouse Game? Simulating Self-Evolving Phishing Attacks with LLMs and Genetic Algorithms Authors: Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki | Published: 2025-07-29 2025.07.29 2025.07.31 Literature Database
Cascading and Proxy Membership Inference Attacks Authors: Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-07-29 2025.07.29 2025.07.31 Literature Database
Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28 2025.07.28 2025.07.30 Literature Database
Characterizing the Sensitivity to Individual Bit Flips in Client-Side Operations of the CKKS Scheme Authors: Matias Mazzanti, Augusto Vega, Esteban Mocskos | Published: 2025-07-28 2025.07.28 2025.07.30 Literature Database
Scout: Leveraging Large Language Models for Rapid Digital Evidence Discovery Authors: Shariq Murtuza | Published: 2025-07-24 2025.07.24 2025.07.26 Literature Database
On Reconstructing Training Data From Bayesian Posteriors and Trained Models Authors: George Wynne | Published: 2025-07-24 2025.07.24 2025.07.26 Literature Database