A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles Authors: Md Ashraf Uddin, Nam H. Chu, Reza Rafeh, Mutaz Barika | Published: 2025-05-22 Attack TypeFederated Learning階層型分類モデル 2025.05.22 2025.05.28 Literature Database
Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval Authors: Taiye Chen, Zeming Wei, Ang Li, Yisen Wang | Published: 2025-05-21 RAGLarge Language ModelDefense Mechanism 2025.05.21 2025.05.28 Literature Database
Alignment Under Pressure: The Case for Informed Adversaries When Evaluating LLM Defenses Authors: Xiaoxue Yang, Bozhidar Stevanoski, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2025-05-21 AlignmentPrompt InjectionDefense Mechanism 2025.05.21 2025.05.28 Literature Database
Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries Authors: Yuhao Wang, Wenjie Qu, Yanze Jiang, Zichen Liu, Yue Liu, Shengfang Zhai, Yinpeng Dong, Jiaheng Zhang | Published: 2025-05-21 RAGPoisoning attack on RAGPrivacy Loss Analysis 2025.05.21 2025.05.28 Literature Database
Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21 Text Generation MethodPrompt leakingVulnerability of Visualization 2025.05.21 2025.05.28 Literature Database
Adaptive Plan-Execute Framework for Smart Contract Security Auditing Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Zhe Hou, Zixiao Zhao | Published: 2025-05-21 | Updated: 2025-05-22 RAGPrompt leakingDynamic Analysis 2025.05.21 2025.05.28 Literature Database
A Linear Approach to Data Poisoning Authors: Diego Granziol, Donald Flynn | Published: 2025-05-21 PoisoningDynamic AnalysisStatistical Analysis 2025.05.21 2025.05.28 Literature Database
A Survey On Secure Machine Learning Authors: Taobo Liao, Taoran Li, Prathamesh Nadkarni | Published: 2025-05-21 Privacy AssessmentMembership Inference暗号化スキームの詳細 2025.05.21 2025.05.28 Literature Database
TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting Authors: Michael Wrana, Uzma Maroof, Diogo Barradas | Published: 2025-05-20 ウェブサイトトレースの可視化Efficiency EvaluationDefense Effectiveness Analysis 2025.05.20 2025.05.28 Literature Database
sudoLLM : On Multi-role Alignment of Language Models Authors: Soumadeep Saha, Akshay Chaturvedi, Joy Mahapatra, Utpal Garain | Published: 2025-05-20 AlignmentPrompt InjectionLarge Language Model 2025.05.20 2025.05.28 Literature Database