Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25 2025.06.25 2025.06.27 Literature Database
JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation Authors: Guoqiang Chen, Xin Jin, Zhiqiang Lin | Published: 2025-06-25 2025.06.25 2025.06.27 Literature Database
Machine Learning with Privacy for Protected Attributes Authors: Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs Authors: Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
Decompiling Smart Contracts with a Large Language Model Authors: Isaac David, Liyi Zhou, Dawn Song, Arthur Gervais, Kaihua Qin | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty Authors: Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, Yue Zhao | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes Authors: Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk Authors: Sajal Halder, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
Amplifying Machine Learning Attacks Through Strategic Compositions Authors: Yugeng Liu, Zheng Li, Hai Huang, Michael Backes, Yang Zhang | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database