NetEcho: From Real-World Streaming Side-Channels to Full LLM Conversation Recovery Authors: Zheng Zhang, Guanlong Wu, Sen Deng, Shuai Wang, Yinqian Zhang | Published: 2025-10-29 2025.10.29 2025.10.31 Literature Database
An In-Depth Analysis of Cyber Attacks in Secured Platforms Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29 2025.10.29 2025.10.31 Literature Database
AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios Authors: Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai | Published: 2025-10-29 2025.10.29 2025.10.31 Literature Database
A Novel XAI-Enhanced Quantum Adversarial Networks for Velocity Dispersion Modeling in MaNGA Galaxies Authors: Sathwik Narkedimilli, N V Saran Kumar, Aswath Babu H, Manjunath K Vanahalli, Manish M, Vinija Jain, Aman Chadha | Published: 2025-10-28 2025.10.28 2025.10.30 Literature Database
Design and Optimization of Cloud Native Homomorphic Encryption Workflows for Privacy-Preserving ML Inference Authors: Tejaswini Bollikonda | Published: 2025-10-28 2025.10.28 2025.10.30 Literature Database
Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28 2025.10.28 2025.10.30 Literature Database
SPEAR++: Scaling Gradient Inversion via Sparsely-Used Dictionary Learning Authors: Alexander Bakarsky, Dimitar I. Dimitrov, Maximilian Baader, Martin Vechev | Published: 2025-10-28 2025.10.28 2025.10.30 Literature Database
LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28 2025.10.28 2025.10.30 Literature Database
Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks Authors: Yaokai Feng, Kouichi Sakurai | Published: 2025-10-27 2025.10.27 2025.10.29 Literature Database
Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27 2025.10.27 2025.10.29 Literature Database