Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27 2025.08.27 2025.08.29 Literature Database
SoK: Large Language Model Copyright Auditing via Fingerprinting Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27 2025.08.27 2025.08.29 Literature Database
Safety Alignment Should Be Made More Than Just A Few Attention Heads Authors: Chao Huang, Zefeng Zhang, Juewei Yue, Quangang Li, Chuang Zhang, Tingwen Liu | Published: 2025-08-27 2025.08.27 2025.08.29 Literature Database
Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses Authors: Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong | Published: 2025-08-27 2025.08.27 2025.08.29 Literature Database
Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents Authors: Zhixin Lin, Jungang Li, Shidong Pan, Yibo Shi, Yue Yao, Dongliang Xu | Published: 2025-08-27 2025.08.27 2025.08.29 Literature Database
SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications Authors: Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong | Published: 2025-08-26 2025.08.26 2025.08.28 Literature Database
The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization Authors: Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes | Published: 2025-08-26 2025.08.26 2025.08.28 Literature Database
LLMs in the SOC: An Empirical Study of Human-AI Collaboration in Security Operations Centres Authors: Ronal Singh, Shahroz Tariq, Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris, Martin Lochner | Published: 2025-08-26 2025.08.26 2025.08.28 Literature Database
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation Authors: Shaswata Mitra, Azim Bazarov, Martin Duclos, Sudip Mittal, Aritran Piplai, Md Rayhanur Rahman, Edward Zieglar, Shahram Rahimi | Published: 2025-08-26 2025.08.26 2025.08.28 Literature Database
Membership Inference Attacks on LLM-based Recommender Systems Authors: Jiajie He, Yuechun Gu, Min-Chun Chen, Keke Chen | Published: 2025-08-26 2025.08.26 2025.08.28 Literature Database