Defending Against Prompt Injection With a Few DefensiveTokens Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
Can Large Language Models Improve Phishing Defense? A Large-Scale Controlled Experiment on Warning Dialogue Explanations Authors: Federico Maria Cau, Giuseppe Desolda, Francesco Greco, Lucio Davide Spano, Luca Viganò | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
GuardVal: Dynamic Large Language Model Jailbreak Evaluation for Comprehensive Safety Testing Authors: Peiyan Zhang, Haibo Jin, Liying Kang, Haohan Wang | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks Authors: Mohammad F. Al-Hammouri, Yazan Otoum, Rasha Atwa, Amiya Nayak | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models Authors: Jikesh Thapa, Gurrehmat Chahal, Serban Voinea Gabreanu, Yazan Otoum | Published: 2025-07-10 2025.07.10 2025.07.12 Literature Database
ZKTorch: Compiling ML Inference to Zero-Knowledge Proofs via Parallel Proof Accumulation Authors: Bing-Jyue Chen, Lilia Tang, Daniel Kang | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
BarkBeetle: Stealing Decision Tree Models with Fault Injection Authors: Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
Unifying Re-Identification, Attribute Inference, and Data Reconstruction Risks in Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Jamie Hayes, Borja Balle, Flavio du Pin Calmon, Jean Louis Raisaro | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database