SPATA: Systematic Pattern Analysis for Detailed and Transparent Data Cards Authors: João Vitorino, Eva Maia, Isabel Praça, Carlos Soares | Published: 2025-09-30 Privacy-Preserving Machine LearningAdversarial LearningInterpretability 2025.09.30 2025.10.02 Literature Database
Explainable and Resilient ML-Based Physical-Layer Attack Detectors Authors: Aleksandra Knapińska, Marija Furdek | Published: 2025-09-30 Model InversionModel Performance Evaluation物理層攻撃検出 2025.09.30 2025.10.02 Literature Database
SeedPrints: Fingerprints Can Even Tell Which Seed Your Large Language Model Was Trained From Authors: Yao Tong, Haonan Wang, Siquan Li, Kenji Kawaguchi, Tianyang Hu | Published: 2025-09-30 Token Distribution AnalysisHallucinationModel Performance Evaluation 2025.09.30 2025.10.02 Literature Database
Better Privilege Separation for Agents by Restricting Data Types Authors: Dennis Jacob, Emad Alghamdi, Zhanhao Hu, Basel Alomair, David Wagner | Published: 2025-09-30 Indirect Prompt InjectionSecurity Strategy GenerationMalicious Prompt 2025.09.30 2025.10.02 Literature Database
Fingerprinting LLMs via Prompt Injection Authors: Yuepeng Hu, Zhengyuan Jiang, Mengyuan Li, Osama Ahmed, Zhicong Huang, Cheng Hong, Neil Gong | Published: 2025-09-29 | Updated: 2025-10-01 Indirect Prompt InjectionToken Identification MethodPrompt Injection 2025.09.29 2025.10.03 Literature Database
Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Jinyuan Jia, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 Indirect Prompt InjectionBias Mitigation TechniquesVulnerability Prediction 2025.09.28 2025.10.03 Literature Database
Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 RAGSecurity Strategy GenerationEfficient Resolution of Learning Tasks 2025.09.28 2025.10.03 Literature Database
Measuring Physical-World Privacy Awareness of Large Language Models: An Evaluation Benchmark Authors: Xinjie Shen, Mufei Li, Pan Li | Published: 2025-09-27 | Updated: 2025-10-13 HallucinationPrivacy Enhancing Technology倫理的選択評価 2025.09.27 2025.10.15 Literature Database
MaskSQL: Safeguarding Privacy for LLM-Based Text-to-SQL via Abstraction Authors: Sepideh Abedini, Shubhankar Mohapatra, D. B. Emerson, Masoumeh Shafieinejad, Jesse C. Cresswell, Xi He | Published: 2025-09-27 | Updated: 2025-09-30 SQLクエリ生成Prompt InjectionPrompt leaking 2025.09.27 2025.10.02 Literature Database
LLM Watermark Evasion via Bias Inversion Authors: Jeongyeon Hwang, Sangdon Park, Jungseul Ok | Published: 2025-09-27 | Updated: 2025-10-01 Disabling Safety Mechanisms of LLMModel InversionStatistical Testing 2025.09.27 2025.10.03 Literature Database