Reading Between the Lines: Towards Reliable Black-box LLM Fingerprinting via Zeroth-order Gradient Estimation Authors: Shuo Shao, Yiming Li, Hongwei Yao, Yifei Chen, Yuchen Yang, Zhan Qin | Published: 2025-10-08 2025.10.08 2026.05.01 Literature Database
From Description to Detection: LLM based Extendable O-RAN Compliant Blind DoS Detection in 5G and Beyond Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-10-08 2025.10.08 2026.05.01 Literature Database
AutoDAN-Reasoning: Enhancing Strategies Exploration based Jailbreak Attacks with Test-Time Scaling Authors: Xiaogeng Liu, Chaowei Xiao | Published: 2025-10-06 | Updated: 2025-10-08 2025.10.06 2026.05.01 Literature Database
Proactive defense against LLM Jailbreak Authors: Weiliang Zhao, Jinjun Peng, Daniel Ben-Levi, Zhou Yu, Junfeng Yang | Published: 2025-10-06 2025.10.06 2025.10.08 Literature Database
What your brain activity says about you: A review of neuropsychiatric disorders identified in resting-state and sleep EEG data Authors: J. E. M. Scanlon, A. Pelzer, M. Gharleghi, K. C. Fuhrmeister, T. Köllmer, P. Aichroth, R. Göder, C. Hansen, K. I. Wolf | Published: 2025-10-06 2025.10.06 2025.10.08 Literature Database
Federated Computation of ROC and PR Curves Authors: Xuefeng Xu, Graham Cormode | Published: 2025-10-06 2025.10.06 2025.10.08 Literature Database
Unified Threat Detection and Mitigation Framework (UTDMF): Combating Prompt Injection, Deception, and Bias in Enterprise-Scale Transformers Authors: Santhosh KumarRavindran | Published: 2025-10-06 2025.10.06 2025.10.08 Literature Database
P2P: A Poison-to-Poison Remedy for Reliable Backdoor Defense in LLMs Authors: Shuai Zhao, Xinyi Wu, Shiqian Zhao, Xiaobao Wu, Zhongliang Guo, Yanhao Jia, Anh Tuan Luu | Published: 2025-10-06 2025.10.06 2025.10.08 Literature Database
Autonomy Matters: A Study on Personalization-Privacy Dilemma in LLM Agents Authors: Zhiping Zhang, Yi Evie Zhang, Freda Shi, Tianshi Li | Published: 2025-10-06 2025.10.06 2025.10.08 Literature Database
Machine Unlearning Meets Adversarial Robustness via Constrained Interventions on LLMs Authors: Fatmazohra Rezkellah, Ramzi Dakhmouche | Published: 2025-10-03 | Updated: 2025-10-15 2025.10.03 2025.10.17 Literature Database