QGuard:Question-based Zero-shot Guard for Multi-modal LLM Safety Authors: Taegyeong Lee, Jeonghwa Yoo, Hyoungseo Cho, Soo Yong Kim, Yunho Maeng | Published: 2025-06-14 | Updated: 2025-09-30 2025.06.14 2025.10.02 Literature Database
SEC-bench: Automated Benchmarking of LLM Agents on Real-World Software Security Tasks Authors: Hwiwon Lee, Ziqi Zhang, Hanxiao Lu, Lingming Zhang | Published: 2025-06-13 | Updated: 2025-10-22 2025.06.13 2025.10.24 Literature Database
LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model’s Response for Vulnerability Analysis Authors: Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang | Published: 2025-06-12 | Updated: 2025-09-03 2025.06.12 2025.09.05 Literature Database
ChineseHarm-Bench: A Chinese Harmful Content Detection Benchmark Authors: Kangwei Liu, Siyuan Cheng, Bozhong Tian, Xiaozhuan Liang, Yuyang Yin, Meng Han, Ningyu Zhang, Bryan Hooi, Xi Chen, Shumin Deng | Published: 2025-06-12 2025.06.12 2025.06.14 Literature Database
Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World Authors: Huma Habib Shadan, Sardar Islam | Published: 2025-06-12 | Updated: 2025-07-08 2025.06.12 2025.07.10 Literature Database
Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework Authors: Xia Du, Xiaoyuan Liu, Jizhe Zhou, Zheng Lin, Chi-man Pun, Zhe Chen, Wei Ni, Jun Luo | Published: 2025-06-12 2025.06.12 2025.06.14 Literature Database
SoK: Evaluating Jailbreak Guardrails for Large Language Models Authors: Xunguang Wang, Zhenlan Ji, Wenxuan Wang, Zongjie Li, Daoyuan Wu, Shuai Wang | Published: 2025-06-12 2025.06.12 2025.06.14 Literature Database
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks Authors: Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li | Published: 2025-06-12 2025.06.12 2025.06.14 Literature Database
FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular Graph Convolutional Networks Authors: Zhaoxuan Kan, Husheng Han, Shangyi Shi, Tenghui Hua, Hang Lu, Xiaowei Li, Jianan Mu, Xing Hu | Published: 2025-06-12 2025.06.12 2025.06.14 Literature Database
Can We Infer Confidential Properties of Training Data from LLMs? Authors: Penguin Huang, Chhavi Yadav, Ruihan Wu, Kamalika Chaudhuri | Published: 2025-06-12 2025.06.12 2025.06.14 Literature Database