A Comprehensive Guide to Differential Privacy: From Theory to User Expectations

Authors: Napsu Karmitsa, Antti Airola, Tapio Pahikkala, Tinja Pitkämäki | Published: 2025-09-03

PromptCOS: Towards System Prompt Copyright Auditing for LLMs via Content-level Output Similarity

Authors: Yuchen Yang, Yiming Li, Hongwei Yao, Enhao Huang, Shuo Shao, Bingrun Yang, Zhibo Wang, Dacheng Tao, Zhan Qin | Published: 2025-09-03

EverTracer: Hunting Stolen Large Language Models via Stealthy and Robust Probabilistic Fingerprint

Authors: Zhenhua Xu, Meng Han, Wenpeng Xing | Published: 2025-09-03

E-PhishGen: Unlocking Novel Research in Phishing Email Detection

Authors: Luca Pajola, Eugenio Caripoti, Stefan Banzer, Simeone Pizzi, Mauro Conti, Giovanni Apruzzese | Published: 2025-09-01 | Updated: 2025-09-15

RepoMark: A Data-Usage Auditing Framework for Code Large Language Models

Authors: Wenjie Qu, Yuguang Zhou, Bo Wang, Yuexin Li, Lionel Z. Wang, Jinyuan Jia, Jiaheng Zhang | Published: 2025-08-29 | Updated: 2025-11-03

PromptSleuth: Detecting Prompt Injection via Semantic Intent Invariance

Authors: Mengxiao Wang, Yuxuan Zhang, Guofei Gu | Published: 2025-08-28

AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning

Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28

Multi-Agent Penetration Testing AI for the Web

Authors: Isaac David, Arthur Gervais | Published: 2025-08-28

CyberSleuth: Autonomous Blue-Team LLM Agent for Web Attack Forensics

Authors: Stefano Fumero, Kai Huang, Matteo Boffa, Danilo Giordano, Marco Mellia, Zied Ben Houidi, Dario Rossi | Published: 2025-08-28

Human-AI Collaborative Bot Detection in MMORPGs

Authors: Jaeman Son, Hyunsoo Kim | Published: 2025-08-28