What If, But Privately: Private Counterfactual Retrieval Authors: Shreya Meel, Mohamed Nomeir, Pasan Dissanayake, Sanghamitra Dutta, Sennur Ulukus | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
Intrusion Detection in Heterogeneous Networks with Domain-Adaptive Multi-Modal Learning Authors: Mabin Umman Varghese, Zahra Taghiyarrenani | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
When Good Sounds Go Adversarial: Jailbreaking Audio-Language Models with Benign Inputs Authors: Bodam Kim, Hiskias Dingeto, Taeyoun Kwon, Dasol Choi, DongGeon Lee, Haon Park, JaeHoon Lee, Jongho Shin | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
From Legacy to Standard: LLM-Assisted Transformation of Cybersecurity Playbooks into CACAO Format Authors: Mehdi Akbari Gurabi, Lasse Nitz, Radu-Mihai Castravet, Roman Matzutt, Avikarsha Mandal, Stefan Decker | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs Authors: Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04 2025.08.04 2025.08.06 Literature Database
SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04 2025.08.04 2025.08.06 Literature Database
A Survey on Data Security in Large Language Models Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04 2025.08.04 2025.08.06 Literature Database
FPEdit: Robust LLM Fingerprinting through Localized Knowledge Editing Authors: Shida Wang, Chaohu Liu, Yubo Wang, Linli Xu | Published: 2025-08-04 2025.08.04 2025.08.06 Literature Database