Extending the OWASP Multi-Agentic System Threat Modeling Guide: Insights from Multi-Agent Security Research Authors: Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-08-13 2025.08.13 2025.08.15 Literature Database
Demystifying the Role of Rule-based Detection in AI Systems for Windows Malware Detection Authors: Andrea Ponte, Luca Demetrio, Luca Oneto, Ivan Tesfai Ogbu, Battista Biggio, Fabio Roli | Published: 2025-08-13 2025.08.13 2025.08.15 Literature Database
Causal Graph Profiling via Structural Divergence for Robust Anomaly Detection in Cyber-Physical Systems Authors: Arun Vignesh Malarkkan, Haoyue Bai, Dongjie Wang, Yanjie Fu | Published: 2025-08-13 2025.08.13 2025.08.15 Literature Database
Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference Authors: Zhifan Luo, Shuo Shao, Su Zhang, Lijing Zhou, Yuke Hu, Chenxu Zhao, Zhihao Liu, Zhan Qin | Published: 2025-08-13 2025.08.13 2025.08.15 Literature Database
Attacks and Defenses Against LLM Fingerprinting Authors: Kevin Kurian, Ethan Holland, Sean Oesch | Published: 2025-08-12 2025.08.12 2025.08.14 Literature Database
Oblivionis: A Lightweight Learning and Unlearning Framework for Federated Large Language Models Authors: Fuyao Zhang, Xinyu Yan, Tiantong Wu, Wenjie Li, Tianxiang Chen, Yang Cao, Ran Yan, Longtao Huang, Wei Yang Bryan Lim, Qiang Yang | Published: 2025-08-12 2025.08.12 2025.08.14 Literature Database
EditMF: Drawing an Invisible Fingerprint for Your Large Language Models Authors: Jiaxuan Wu, Yinghan Zhou, Wanli Peng, Yiming Xue, Juan Wen, Ping Zhong | Published: 2025-08-12 2025.08.12 2025.08.14 Literature Database
Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection Authors: Aydin Zaboli, Junho Hong | Published: 2025-08-12 2025.08.12 2025.08.14 Literature Database
Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-08-11 2025.08.11 2025.08.13 Literature Database
Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation Authors: Jiongchi Yu, Xiaofei Xie, Qiang Hu, Yuhan Ma, Ziming Zhao | Published: 2025-08-11 2025.08.11 2025.08.13 Literature Database