Literature Database

文献データベースでは、AIセキュリティに関する文献情報を分類・集約しています。詳しくは文献データベースについてをご覧ください。統計情報のページでは、収集された文献に関する統計情報を公開しています。
The Literature Database categorizes and aggregates literature related to AI security. For more details, please see About Literature Database. We provide statistical information regarding the Literature Database on the Statistics page.

A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems

Authors: Zixuan Liu, Yi Zhao, Zhuotao Liu, Qi Li, Chuanpu Fu, Guangmeng Zhou, Ke Xu | Published: 2025-10-16
Modification of Network Traffic
Botnet Traffic
Model Extraction Attack

Secure Sparse Matrix Multiplications and their Applications to Privacy-Preserving Machine Learning

Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2025-10-16
Data Protection
Privacy-Preserving Machine Learning
Differential Privacy

LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet?

Authors: Bin Liu, Yanjie Zhao, Guoai Xu, Haoyu Wang | Published: 2025-10-16
Indirect Prompt Injection
エージェント設計
Security Analysis

Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration

Authors: Evangelos Lamprou, Julian Dai, Grigoris Ntousakis, Martin C. Rinard, Nikos Vasilakis | Published: 2025-10-16
Security Analysis
Program Verification
Prompt leaking

Are My Optimized Prompts Compromised? Exploring Vulnerabilities of LLM-based Optimizers

Authors: Andrew Zhao, Reshmi Ghosh, Vitor Carvalho, Emily Lawton, Keegan Hines, Gao Huang, Jack W. Stokes | Published: 2025-10-16
Prompt Injection
Prompt leaking
Large Language Model

Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy, and Security Studies

Authors: Mason Nakamura, Abhinav Kumar, Saaduddin Mahmud, Sahar Abdelnabi, Shlomo Zilberstein, Eugene Bagdasarian | Published: 2025-10-16
エージェント設計
Large Language Model
通信プロトコル

RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models

Authors: Fanchao Meng, Jiaping Gui, Yunbo Li, Yue Wu | Published: 2025-10-16
Network Traffic Analysis
Backdoor Detection
Evaluation Method

In-Browser LLM-Guided Fuzzing for Real-Time Prompt Injection Testing in Agentic AI Browsers

Authors: Avihay Cohen | Published: 2025-10-15
Indirect Prompt Injection
Large Language Model
自動生成フレームワーク

Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored Mixture-of-Experts Transformers

Authors: Xin Zhao, Xiaojun Chen, Bingshan Liu, Haoyu Gao, Zhendong Zhao, Yilong Chen | Published: 2025-10-15
Backdoor Detection
Prompt leaking
Large Language Model

Toward Efficient Inference Attacks: Shadow Model Sharing via Mixture-of-Experts

Authors: Li Bai, Qingqing Ye, Xinwei Zhang, Sen Zhang, Zi Liang, Jianliang Xu, Haibo Hu | Published: 2025-10-15
Trigger Detection
Model Architecture
攻撃モデルの訓練