From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22 2025.12.22 2025.12.24 Literature Database
Causal-Guided Detoxify Backdoor Attack of Open-Weight LoRA Models Authors: Linzhi Chen, Yang Sun, Hongru Wei, Yuqi Chen | Published: 2025-12-22 2025.12.22 2025.12.24 Literature Database
GShield: Mitigating Poisoning Attacks in Federated Learning Authors: Sameera K. M., Serena Nicolazzo, Antonino Nocera, Vinod P., Rafidha Rehiman K. A | Published: 2025-12-22 2025.12.22 2025.12.24 Literature Database
Elevating Intrusion Detection and Security Fortification in Intelligent Networks through Cutting-Edge Machine Learning Paradigms Authors: Md Minhazul Islam Munna, Md Mahbubur Rahman, Jaroslav Frnda, Muhammad Shahid Anwar, Alpamis Kutlimuratov | Published: 2025-12-22 2025.12.22 2025.12.24 Literature Database
The Erasure Illusion: Stress-Testing the Generalization of LLM Forgetting Evaluation Authors: Hengrui Jia, Taoran Li, Jonas Guan, Varun Chandrasekaran | Published: 2025-12-22 2025.12.22 2025.12.24 Literature Database
DREAM: Dynamic Red-teaming across Environments for AI Models Authors: Liming Lu, Xiang Gu, Junyu Huang, Jiawei Du, Yunhuai Liu, Yongbin Zhou, Shuchao Pang | Published: 2025-12-22 2025.12.22 2025.12.24 Literature Database
Efficient Jailbreak Mitigation Using Semantic Linear Classification in a Multi-Staged Pipeline Authors: Akshaj Prashanth Rao, Advait Singh, Saumya Kumaar Saksena, Dhruv Kumar | Published: 2025-12-22 2025.12.22 2025.12.24 Literature Database
Phishing Detection System: An Ensemble Approach Using Character-Level CNN and Feature Engineering Authors: Rudra Dubey, Arpit Mani Tripathi, Archit Srivastava, Sarvpal Singh | Published: 2025-12-18 2025.12.18 2025.12.20 Literature Database
Prefix Probing: Lightweight Harmful Content Detection for Large Language Models Authors: Jirui Yang, Hengqi Guo, Zhihui Lu, Yi Zhao, Yuansen Zhang, Shijing Hu, Qiang Duan, Yinggui Wang, Tao Wei | Published: 2025-12-18 2025.12.18 2025.12.20 Literature Database
A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection Authors: Xiao Li, Yue Li, Hao Wu, Yue Zhang, Yechao Zhang, Fengyuan Xu, Sheng Zhong | Published: 2025-12-18 2025.12.18 2025.12.20 Literature Database