From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection Authors: Chaomeng Lu, Bert Lagaisse | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database
When Reject Turns into Accept: Quantifying the Vulnerability of LLM-Based Scientific Reviewers to Indirect Prompt Injection Authors: Devanshu Sahoo, Manish Prasad, Vasudev Majhi, Jahnvi Singh, Vinay Chamola, Yash Sinha, Murari Mandal, Dhruv Kumar | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database
Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems Authors: N Mangala, Murtaza Rangwala, S Aishwarya, B Eswara Reddy, Rajkumar Buyya, KR Venugopal, SS Iyengar, LM Patnaik | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database
D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning Authors: Yash Srivastava, Shalin Jain, Sneha Awathare, Nitin Awathare | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs Authors: Venkata Tanuja Madireddy | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database
FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning Authors: Khurram Khalil, Khaza Anuarul Hoque | Published: 2025-12-10 2025.12.10 2025.12.12 Literature Database
True Random Number Generators on IQM Spark Authors: Andrzej Gnatowski, Jarosław Rudy, Teodor Niżyński, Krzysztof Święcicki | Published: 2025-12-10 2025.12.10 2025.12.12 Literature Database
Defining Cost Function of Steganography with Large Language Models Authors: Hanzhou Wu, Yige Wang | Published: 2025-12-10 2025.12.10 2025.12.12 Literature Database
Chasing Shadows: Pitfalls in LLM Security Research Authors: Jonathan Evertz, Niklas Risse, Nicolai Neuer, Andreas Müller, Philipp Normann, Gaetano Sapia, Srishti Gupta, David Pape, Soumya Shaw, Devansh Srivastav, Christian Wressnegger, Erwin Quiring, Thorsten Eisenhofer, Daniel Arp, Lea Schönherr | Published: 2025-12-10 2025.12.10 2025.12.12 Literature Database
Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks Authors: Xinye Cao, Yihan Lin, Guoshun Nan, Qinchuan Zhou, Yuhang Luo, Yurui Gao, Zeliang Zhang, Haolang Lu, Qimei Cui, Yanzhao Hou, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-12-10 2025.12.10 2025.12.12 Literature Database