Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy, and Security Studies Authors: Mason Nakamura, Abhinav Kumar, Saaduddin Mahmud, Sahar Abdelnabi, Shlomo Zilberstein, Eugene Bagdasarian | Published: 2025-10-16 2025.10.16 2025.10.18 Literature Database
RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models Authors: Fanchao Meng, Jiaping Gui, Yunbo Li, Yue Wu | Published: 2025-10-16 2025.10.16 2025.10.18 Literature Database
In-Browser LLM-Guided Fuzzing for Real-Time Prompt Injection Testing in Agentic AI Browsers Authors: Avihay Cohen | Published: 2025-10-15 2025.10.15 2025.10.17 Literature Database
Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored Mixture-of-Experts Transformers Authors: Xin Zhao, Xiaojun Chen, Bingshan Liu, Haoyu Gao, Zhendong Zhao, Yilong Chen | Published: 2025-10-15 2025.10.15 2025.10.17 Literature Database
Toward Efficient Inference Attacks: Shadow Model Sharing via Mixture-of-Experts Authors: Li Bai, Qingqing Ye, Xinwei Zhang, Sen Zhang, Zi Liang, Jianliang Xu, Haibo Hu | Published: 2025-10-15 2025.10.15 2025.10.17 Literature Database
Injection, Attack and Erasure: Revocable Backdoor Attacks via Machine Unlearning Authors: Baogang Song, Dongdong Zhao, Jianwen Xiang, Qiben Xu, Zizhuo Yu | Published: 2025-10-15 2025.10.15 2025.10.17 Literature Database
Evaluating and Mitigating LLM-as-a-judge Bias in Communication Systems Authors: Jiaxin Gao, Chen Chen, Yanwen Jia, Xueluan Gong, Kwok-Yan Lam, Qian Wang | Published: 2025-10-14 2025.10.14 2025.10.16 Literature Database
Traveling Salesman-Based Token Ordering Improves Stability in Homomorphically Encrypted Language Models Authors: Donghwan Rho, Sieun Seo, Hyewon Sung, Chohong Min, Ernest K. Ryu | Published: 2025-10-14 2025.10.14 2025.10.16 Literature Database
DeepTrust: Multi-Step Classification through Dissimilar Adversarial Representations for Robust Android Malware Detection Authors: Daniel Pulido-Cortázar, Daniel Gibert, Felip Manyà | Published: 2025-10-14 2025.10.14 2025.10.16 Literature Database
PromptLocate: Localizing Prompt Injection Attacks Authors: Yuqi Jia, Yupei Liu, Zedian Shao, Jinyuan Jia, Neil Gong | Published: 2025-10-14 2025.10.14 2025.10.16 Literature Database