Small Language Models for Phishing Website Detection: Cost, Performance, and Privacy Trade-Offs Authors: Georg Goldenits, Philip Koenig, Sebastian Raubitzek, Andreas Ekelhart | Published: 2025-11-19 2025.11.19 2025.11.21 Literature Database
Taxonomy, Evaluation and Exploitation of IPI-Centric LLM Agent Defense Frameworks Authors: Zimo Ji, Xunguang Wang, Zongjie Li, Pingchuan Ma, Yudong Gao, Daoyuan Wu, Xincheng Yan, Tian Tian, Shuai Wang | Published: 2025-11-19 2025.11.19 2025.11.21 Literature Database
Can MLLMs Detect Phishing? A Comprehensive Security Benchmark Suite Focusing on Dynamic Threats and Multimodal Evaluation in Academic Environments Authors: Jingzhuo Zhou | Published: 2025-11-19 2025.11.19 2025.11.21 Literature Database
Towards Classifying Benign And Malicious Packages Using Machine Learning Authors: Thanh-Cong Nguyen, Ngoc-Thanh Nguyen, Van-Giau Ung, Duc-Ly Vu | Published: 2025-11-19 2025.11.19 2025.11.21 Literature Database
Critical Evaluation of Quantum Machine Learning for Adversarial Robustness Authors: Saeefa Rubaiyet Nowmi, Jesus Lopez, Md Mahmudul Alam Imon, Shahrooz Pouryouse, Mohammad Saidur Rahman | Published: 2025-11-19 2025.11.19 2025.11.21 Literature Database
Sigil: Server-Enforced Watermarking in U-Shaped Split Federated Learning via Gradient Injection Authors: Zhengchunmin Dai, Jiaxiong Tang, Peng Sun, Honglong Chen, Liantao Wu | Published: 2025-11-18 2025.11.18 2025.11.20 Literature Database
Beyond Fixed and Dynamic Prompts: Embedded Jailbreak Templates for Advancing LLM Security Authors: Hajun Kim, Hyunsik Na, Daeseon Choi | Published: 2025-11-18 2025.11.18 2025.11.20 Literature Database
Observational Auditing of Label Privacy Authors: Iden Kalemaj, Luca Melis, Maxime Boucher, Ilya Mironov, Saeed Mahloujifar | Published: 2025-11-18 2025.11.18 2025.11.20 Literature Database
Dynamic Black-box Backdoor Attacks on IoT Sensory Data Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18 2025.11.18 2025.11.20 Literature Database
GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards Authors: Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma | Published: 2025-11-18 2025.11.18 2025.11.20 Literature Database