Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07 2025.08.07 2025.08.09 Literature Database
JPS: Jailbreak Multimodal Large Language Models with Collaborative Visual Perturbation and Textual Steering Authors: Renmiao Chen, Shiyao Cui, Xuancheng Huang, Chengwei Pan, Victor Shea-Jay Huang, QingLin Zhang, Xuan Ouyang, Zhexin Zhang, Hongning Wang, Minlie Huang | Published: 2025-08-07 2025.08.07 2025.08.09 Literature Database
Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing Technologies Authors: Marc Damie, Mihai Pop, Merijn Posthuma | Published: 2025-08-06 2025.08.06 2025.08.08 Literature Database
Matrix-Free Two-to-Infinity and One-to-Two Norms Estimation Authors: Askar Tsyganov, Evgeny Frolov, Sergey Samsonov, Maxim Rakhuba | Published: 2025-08-06 2025.08.06 2025.08.08 Literature Database
Prompt Injection Vulnerability of Consensus Generating Applications in Digital Democracy Authors: Jairo Gudiño-Rosero, Clément Contet, Umberto Grandi, César A. Hidalgo | Published: 2025-08-06 2025.08.06 2025.08.08 Literature Database
Leveraging large language models for SQL behavior-based database intrusion detection Authors: Meital Shlezinger, Shay Akirav, Lei Zhou, Liang Guo, Avi Kessel, Guoliang Li | Published: 2025-08-06 | Updated: 2025-08-14 2025.08.06 2025.08.16 Literature Database
What If, But Privately: Private Counterfactual Retrieval Authors: Shreya Meel, Mohamed Nomeir, Pasan Dissanayake, Sanghamitra Dutta, Sennur Ulukus | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
Intrusion Detection in Heterogeneous Networks with Domain-Adaptive Multi-Modal Learning Authors: Mabin Umman Varghese, Zahra Taghiyarrenani | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
When Good Sounds Go Adversarial: Jailbreaking Audio-Language Models with Benign Inputs Authors: Bodam Kim, Hiskias Dingeto, Taeyoun Kwon, Dasol Choi, DongGeon Lee, Haon Park, JaeHoon Lee, Jongho Shin | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database
From Legacy to Standard: LLM-Assisted Transformation of Cybersecurity Playbooks into CACAO Format Authors: Mehdi Akbari Gurabi, Lasse Nitz, Radu-Mihai Castravet, Roman Matzutt, Avikarsha Mandal, Stefan Decker | Published: 2025-08-05 2025.08.05 2025.08.07 Literature Database