An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection Authors: Haywood Gelman, John D. Hastings, David Kenley | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers from LLMs via Claim Verification Authors: Aivin V. Solatorio | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
Not All Samples Are Equal: Quantifying Instance-level Difficulty in Targeted Data Poisoning Authors: William Xu, Yiwei Lu, Yihan Wang, Matthew Y. R. Yang, Zuoqiu Liu, Gautam Kamath, Yaoliang Yu | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language Models Authors: Mohammad Reza Mirbagheri, Mohammad Mahdi Mirkamali, Zahra Motoshaker Arani, Ali Javeri, Amir Mahdi Sadeghzadeh, Rasool Jalili | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
Imitative Membership Inference Attack Authors: Yuntao Du, Yuetian Chen, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop? Authors: Irdin Pekaric, Philipp Zech, Tom Mattson | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
Contrastive Self-Supervised Network Intrusion Detection using Augmented Negative Pairs Authors: Jack Wilkie, Hanan Hindy, Christos Tachtatzis, Robert Atkinson | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database
Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks? Authors: Junjie Mu, Zonghao Ying, Zhekui Fan, Zonglei Jing, Yaoyuan Zhang, Zhengmin Yu, Wenxin Zhang, Quanchen Zou, Xiangzheng Zhang | Published: 2025-09-08 2025.09.08 2025.09.10 Literature Database