Thought Purity: Defense Paradigm For Chain-of-Thought Attack Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16 2025.07.16 2025.07.18 Literature Database
LLAMA: Multi-Feedback Smart Contract Fuzzing Framework with LLM-Guided Seed Generation Authors: Keke Gai, Haochen Liang, Jing Yu, Liehuang Zhu, Dusit Niyato | Published: 2025-07-16 2025.07.16 2025.07.18 Literature Database
Defending Against Prompt Injection With a Few DefensiveTokens Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
Can Large Language Models Improve Phishing Defense? A Large-Scale Controlled Experiment on Warning Dialogue Explanations Authors: Federico Maria Cau, Giuseppe Desolda, Francesco Greco, Lucio Davide Spano, Luca Viganò | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
GuardVal: Dynamic Large Language Model Jailbreak Evaluation for Comprehensive Safety Testing Authors: Peiyan Zhang, Haibo Jin, Liying Kang, Haohan Wang | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks Authors: Mohammad F. Al-Hammouri, Yazan Otoum, Rasha Atwa, Amiya Nayak | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models Authors: Jikesh Thapa, Gurrehmat Chahal, Serban Voinea Gabreanu, Yazan Otoum | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
ZKTorch: Compiling ML Inference to Zero-Knowledge Proofs via Parallel Proof Accumulation Authors: Bing-Jyue Chen, Lilia Tang, Daniel Kang | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
BarkBeetle: Stealing Decision Tree Models with Fault Injection Authors: Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database