SEDULity: A Proof-of-Learning Framework for Distributed and Secure Blockchains with Efficient Useful Work Authors: Weihang Cao, Mustafa Doger, Sennur Ulukus | Published: 2025-12-15 2025.12.15 2025.12.17 Literature Database
Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS Authors: Sabrine Ennaji, Elhadj Benkhelifa, Luigi Vincenzo Mancini | Published: 2025-12-15 2025.12.15 2025.12.17 Literature Database
On the Effectiveness of Membership Inference in Targeted Data Extraction from Large Language Models Authors: Ali Al Sahili, Ali Chehab, Razane Tajeddine | Published: 2025-12-15 2025.12.15 2025.12.17 Literature Database
Security and Detectability Analysis of Unicode Text Watermarking Methods Against Large Language Models Authors: Malte Hellmeier | Published: 2025-12-15 2025.12.15 2025.12.17 Literature Database
Cisco Integrated AI Security and Safety Framework Report Authors: Amy Chang, Tiffany Saade, Sanket Mendapara, Adam Swanda, Ankit Garg | Published: 2025-12-15 2025.12.15 2025.12.17 Literature Database
CTIGuardian: A Few-Shot Framework for Mitigating Privacy Leakage in Fine-Tuned LLMs Authors: Shashie Dilhara Batan Arachchige, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Dinusha Vatsalan, Dali Kaafar | Published: 2025-12-15 2025.12.15 2025.12.17 Literature Database
Virtual camera detection: Catching video injection attacks in remote biometric systems Authors: Daniyar Kurmankhojayev, Andrei Shadrikov, Dmitrii Gordin, Mikhail Shkorin, Danijar Gabdullin, Aigerim Kambetbayeva, Kanat Kuatov | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database
TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection Authors: Jian-Yu Jiang-Lin, Kang-Yang Huang, Ling Zou, Ling Lo, Sheng-Ping Yang, Yu-Wen Tseng, Kun-Hsiang Lin, Chia-Ling Chen, Yu-Ting Ta, Yan-Tsung Wang, Po-Ching Chen, Hongxia Xie, Hong-Han Shuai, Wen-Huang Cheng | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database
LLM-Assisted AHP for Explainable Cyber Range Evaluation Authors: Vyron Kampourakis, Georgios Kavallieratos, Georgios Spathoulas, Vasileios Gkioulos, Sokratis Katsikas | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database
From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection Authors: Chaomeng Lu, Bert Lagaisse | Published: 2025-12-11 2025.12.11 2025.12.13 Literature Database