PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation

Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-21

PiMRef: Detecting and Explaining Ever-evolving Spear Phishing Emails with Knowledge Base Invariants

Authors: Ruofan Liu, Yun Lin, Silas Yeo Shuen Yu, Xiwen Teoh, Zhenkai Liang, Jin Song Dong | Published: 2025-07-21

Distributional Machine Unlearning via Selective Data Removal

Authors: Youssef Allouah, Rachid Guerraoui, Sanmi Koyejo | Published: 2025-07-20 | Updated: 2025-10-08

Fake or Real: The Impostor Hunt in Texts for Space Operations

Authors: Agata Kaczmarek, Dawid Płudowski, Piotr Wilczyński, Przemysław Biecek, Krzysztof Kotowski, Ramez Shendy, Jakub Nalepa, Artur Janicki, Evridiki Ntagiou | Published: 2025-07-17 | Updated: 2025-07-21

A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models

Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17

MAD-Spear: A Conformity-Driven Prompt Injection Attack on Multi-Agent Debate Systems

Authors: Yu Cui, Hongyang Du | Published: 2025-07-17

Thought Purity: Defense Paradigm For Chain-of-Thought Attack

Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16

LLAMA: Multi-Feedback Smart Contract Fuzzing Framework with LLM-Guided Seed Generation

Authors: Keke Gai, Haochen Liang, Jing Yu, Liehuang Zhu, Dusit Niyato | Published: 2025-07-16

Multi-Trigger Poisoning Amplifies Backdoor Vulnerabilities in LLMs

Authors: Sanhanat Sivapiromrat, Caiqi Zhang, Marco Basaldella, Nigel Collier | Published: 2025-07-15 | Updated: 2025-10-09

From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection

Authors: Danyu Sun, Jinghuai Zhang, Jiacen Xu, Yu Zheng, Yuan Tian, Zhou Li | Published: 2025-07-15