GuardVal: Dynamic Large Language Model Jailbreak Evaluation for Comprehensive Safety Testing Authors: Peiyan Zhang, Haibo Jin, Liying Kang, Haohan Wang | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks Authors: Mohammad F. Al-Hammouri, Yazan Otoum, Rasha Atwa, Amiya Nayak | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models Authors: Jikesh Thapa, Gurrehmat Chahal, Serban Voinea Gabreanu, Yazan Otoum | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
ZKTorch: Compiling ML Inference to Zero-Knowledge Proofs via Parallel Proof Accumulation Authors: Bing-Jyue Chen, Lilia Tang, Daniel Kang | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
BarkBeetle: Stealing Decision Tree Models with Fault Injection Authors: Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
Unifying Re-Identification, Attribute Inference, and Data Reconstruction Risks in Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Jamie Hayes, Borja Balle, Flavio du Pin Calmon, Jean Louis Raisaro | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
PenTest2.0: Towards Autonomous Privilege Escalation Using GenAI Authors: Haitham S. Al-Sinani, Chris J. Mitchell | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
Approximating Euler Totient Function using Linear Regression on RSA moduli Authors: Gilda Rech Bansimba, Regis F. Babindamana, Beni Blaug N. Ibara | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database