Literature Database

文献データベースでは、AIセキュリティに関する文献情報を分類・集約しています。詳しくは文献データベースについてをご覧ください。統計情報のページでは、収集された文献に関する統計情報を公開しています。
The Literature Database categorizes and aggregates literature related to AI security. For more details, please see About Literature Database. We provide statistical information regarding the Literature Database on the Statistics page.

Large Language Models for Cyber Security

Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06
Poisoning attack on RAG
Indirect Prompt Injection
Information Security

Adversarially Robust and Interpretable Magecart Malware Detection

Authors: Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça | Published: 2025-11-06
Dynamic Analysis
Adversarial Learning
Interpretability

Differentially Private In-Context Learning with Nearest Neighbor Search

Authors: Antti Koskela, Tejas Kulkarni, Laith Zumot | Published: 2025-11-06
Privacy Protection
Privacy protection framework
Selection Method

Black-Box Guardrail Reverse-engineering Attack

Authors: Hongwei Yao, Yun Xia, Shuo Shao, Haoran Shi, Tong Qiao, Cong Wang | Published: 2025-11-06
Disabling Safety Mechanisms of LLM
Prompt leaking
Information Security

Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems

Authors: Paul Badu Yakubu, Lesther Santana, Mohamed Rahouti, Yufeng Xin, Abdellah Chehri, Mohammed Aledhari | Published: 2025-11-06
Traffic Characteristic Analysis
Model DoS
Feature Importance Analysis

Specification-Guided Vulnerability Detection with Large Language Models

Authors: Hao Zhu, Jia Li, Cuiyun Gao, Jiaru Qian, Yihong Dong, Huanyu Liu, Lecheng Wang, Ziliang Wang, Xiaolong Hu, Ge Li | Published: 2025-11-06
Prompt Injection
Large Language Model
脆弱性検出手法

Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback

Authors: Shiyin Lin | Published: 2025-11-06
Prompt Injection
Dynamic Analysis
Information Security

Whisper Leak: a side-channel attack on Large Language Models

Authors: Geoff McDonald, Jonathan Bar Or | Published: 2025-11-05
Traffic Characteristic Analysis
Prompt leaking
Large Language Model

Watermarking Large Language Models in Europe: Interpreting the AI Act in Light of Technology

Authors: Thomas Souverain | Published: 2025-11-05
Digital Watermarking for Generative AI
Generative Model Characteristics
Transparency and Verification

Let the Bees Find the Weak Spots: A Path Planning Perspective on Multi-Turn Jailbreak Attacks against LLMs

Authors: Yize Liu, Yunyun Hou, Aina Sui | Published: 2025-11-05
Automation of Cybersecurity
Prompt Injection
マルチターン攻撃分析