A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs Authors: Kiho Lee, Jungkon Kim, Doowon Kim, Hyoungshick Kim | Published: 2025-09-16 2025.09.16 2025.09.18 Literature Database
Yet Another Watermark for Large Language Models Authors: Siyuan Bao, Ying Shi, Zhiguang Yang, Hanzhou Wu, Xinpeng Zhang | Published: 2025-09-16 2025.09.16 2025.09.18 Literature Database
Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study Authors: James C. Ward, Alex Bott, Connor York, Edmund R. Hunt | Published: 2025-09-15 2025.09.15 2025.09.17 Literature Database
NeuroStrike: Neuron-Level Attacks on Aligned LLMs Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-09-15 2025.09.15 2025.09.17 Literature Database
An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15 2025.09.15 2025.09.17 Literature Database
Inducing Uncertainty for Test-Time Privacy Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15 2025.09.15 2025.09.17 Literature Database
Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15 2025.09.15 2025.09.17 Literature Database
SoK: How Sensor Attacks Disrupt Autonomous Vehicles: An End-to-end Analysis, Challenges, and Missed Threats Authors: Qingzhao Zhang, Shaocheng Luo, Z. Morley Mao, Miroslav Pajic, Michael K. Reiter | Published: 2025-09-14 | Updated: 2025-09-16 2025.09.14 2025.09.18 Literature Database
SME-TEAM: Leveraging Trust and Ethics for Secure and Responsible Use of AI and LLMs in SMEs Authors: Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, Leandros Maglaras | Published: 2025-09-12 | Updated: 2025-11-05 2025.09.12 2025.11.07 Literature Database
Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector Authors: Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirmare, Vivek Balachandran, Tamal Das | Published: 2025-09-11 2025.09.11 2025.09.13 Literature Database