Robustness and Cybersecurity in the EU Artificial Intelligence Act Authors: Henrik Nolte, Miriam Rateike, Michèle Finck | Published: 2025-02-22 | Updated: 2025-05-28 2025.02.22 2025.05.30 Literature Database
Protecting Users From Themselves: Safeguarding Contextual Privacy in Interactions with Conversational Agents Authors: Ivoline Ngong, Swanand Kadhe, Hao Wang, Keerthiram Murugesan, Justin D. Weisz, Amit Dhurandhar, Karthikeyan Natesan Ramamurthy | Published: 2025-02-22 | Updated: 2025-07-28 2025.02.22 2025.07.30 Literature Database
Benchmarking Android Malware Detection: Traditional vs. Deep Learning Models Authors: Guojun Liu, Doina Caragea, Xinming Ou, Sankardas Roy | Published: 2025-02-20 | Updated: 2025-07-30 2025.02.20 2025.08.01 Literature Database
Red-Teaming LLM Multi-Agent Systems via Communication Attacks Authors: Pengfei He, Yupin Lin, Shen Dong, Han Xu, Yue Xing, Hui Liu | Published: 2025-02-20 | Updated: 2025-06-02 2025.02.20 2025.06.04 Literature Database
A Mousetrap: Fooling Large Reasoning Models for Jailbreak with Chain of Iterative Chaos Authors: Yang Yao, Xuan Tong, Ruofan Wang, Yixu Wang, Lujundong Li, Liang Liu, Yan Teng, Yingchun Wang | Published: 2025-02-19 | Updated: 2025-06-03 2025.02.19 2025.06.05 Literature Database
SEA: Low-Resource Safety Alignment for Multimodal Large Language Models via Synthetic Embeddings Authors: Weikai Lu, Hao Peng, Huiping Zhuang, Cen Chen, Ziqian Zeng | Published: 2025-02-18 | Updated: 2025-05-21 2025.02.18 2025.05.28 Literature Database
Toward Integrated Solutions: A Systematic Interdisciplinary Review of Cybergrooming Research Authors: Heajun An, Marcos Silva, Qi Zhang, Arav Singh, Minqian Liu, Xinyi Zhang, Sarvech Qadir, Sang Won Lee, Lifu Huang, Pamela J. Wisniewski, Jin-Hee Cho | Published: 2025-02-18 | Updated: 2025-07-31 2025.02.18 2025.08.02 Literature Database
Unveiling Privacy Risks in LLM Agent Memory Authors: Bo Wang, Weiyi He, Shenglai Zeng, Zhen Xiang, Yue Xing, Jiliang Tang, Pengfei He | Published: 2025-02-17 | Updated: 2025-06-03 2025.02.17 2025.06.05 Literature Database
BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model Authors: Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | Published: 2025-02-17 | Updated: 2025-07-21 2025.02.17 2025.07.23 Literature Database
DELMAN: Dynamic Defense Against Large Language Model Jailbreaking with Model Editing Authors: Yi Wang, Fenghua Weng, Sibei Yang, Zhan Qin, Minlie Huang, Wenjie Wang | Published: 2025-02-17 | Updated: 2025-05-29 2025.02.17 2025.05.31 Literature Database