AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database
VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database
MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database
SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database
Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database
Consiglieres in the Shadow: Understanding the Use of Uncensored Large Language Models in Cybercrimes Authors: Zilong Lin, Zichuan Li, Xiaojing Liao, XiaoFeng Wang | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database
UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks Authors: Haolin Zheng, Ning Gao, Donghong Cai, Shi Jin, Michail Matthaiou | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database
Systematic Analysis of MCP Security Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database
SoK: Data Minimization in Machine Learning Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14 2025.08.14 2025.08.16 Literature Database
Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14 2025.08.14 2025.08.16 Literature Database