An Automated, Scalable Machine Learning Model Inversion Assessment Pipeline Authors: Tyler Shumaker, Jessica Carpenter, David Saranchak, Nathaniel D. Bastian | Published: 2025-09-04 2025.09.04 2025.09.06 Literature Database
KubeGuard: LLM-Assisted Kubernetes Hardening via Configuration Files and Runtime Logs Analysis Authors: Omri Sgan Cohen, Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai | Published: 2025-09-04 2025.09.04 2025.09.06 Literature Database
NeuroBreak: Unveil Internal Jailbreak Mechanisms in Large Language Models Authors: Chuhan Zhang, Ye Zhang, Bowen Shi, Yuyou Gan, Tianyu Du, Shouling Ji, Dazhan Deng, Yingcai Wu | Published: 2025-09-04 2025.09.04 2025.09.06 Literature Database
Federated Learning: An approach with Hybrid Homomorphic Encryption Authors: Pedro Correia, Ivan Silva, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-09-03 2025.09.03 2025.09.05 Literature Database
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities Authors: Weizhe Wang, Wei Ma, Qiang Hu, Yao Zhang, Jianfei Sun, Bin Wu, Yang Liu, Guangquan Xu, Lingxiao Jiang | Published: 2025-09-03 2025.09.03 2025.09.05 Literature Database
A Comprehensive Guide to Differential Privacy: From Theory to User Expectations Authors: Napsu Karmitsa, Antti Airola, Tapio Pahikkala, Tinja Pitkämäki | Published: 2025-09-03 2025.09.03 2025.09.05 Literature Database
PromptCOS: Towards System Prompt Copyright Auditing for LLMs via Content-level Output Similarity Authors: Yuchen Yang, Yiming Li, Hongwei Yao, Enhao Huang, Shuo Shao, Bingrun Yang, Zhibo Wang, Dacheng Tao, Zhan Qin | Published: 2025-09-03 2025.09.03 2025.09.05 Literature Database
EverTracer: Hunting Stolen Large Language Models via Stealthy and Robust Probabilistic Fingerprint Authors: Zhenhua Xu, Meng Han, Wenpeng Xing | Published: 2025-09-03 2025.09.03 2025.09.05 Literature Database
PromptSleuth: Detecting Prompt Injection via Semantic Intent Invariance Authors: Mengxiao Wang, Yuxuan Zhang, Guofei Gu | Published: 2025-08-28 2025.08.28 2025.09.01 Literature Database
AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28 2025.08.28 2025.09.01 Literature Database