Literature Database

SPATA: Systematic Pattern Analysis for Detailed and Transparent Data Cards

Authors: João Vitorino, Eva Maia, Isabel Praça, Carlos Soares | Published: 2025-09-30
Privacy-Preserving Machine Learning
Adversarial Learning
Interpretability

Explainable and Resilient ML-Based Physical-Layer Attack Detectors

Authors: Aleksandra Knapińska, Marija Furdek | Published: 2025-09-30
Model Inversion
Model Performance Evaluation
物理層攻撃検出

SeedPrints: Fingerprints Can Even Tell Which Seed Your Large Language Model Was Trained From

Authors: Yao Tong, Haonan Wang, Siquan Li, Kenji Kawaguchi, Tianyang Hu | Published: 2025-09-30
Token Distribution Analysis
Hallucination
Model Performance Evaluation

Better Privilege Separation for Agents by Restricting Data Types

Authors: Dennis Jacob, Emad Alghamdi, Zhanhao Hu, Basel Alomair, David Wagner | Published: 2025-09-30
Indirect Prompt Injection
Security Strategy Generation
Malicious Prompt

Fingerprinting LLMs via Prompt Injection

Authors: Yuepeng Hu, Zhengyuan Jiang, Mengyuan Li, Osama Ahmed, Zhicong Huang, Cheng Hong, Neil Gong | Published: 2025-09-29 | Updated: 2025-10-01
Indirect Prompt Injection
Token Identification Method
Prompt Injection

Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence

Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Jinyuan Jia, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01
Indirect Prompt Injection
Bias Mitigation Techniques
Vulnerability Prediction

Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting

Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01
RAG
Security Strategy Generation
Efficient Resolution of Learning Tasks

Measuring Physical-World Privacy Awareness of Large Language Models: An Evaluation Benchmark

Authors: Xinjie Shen, Mufei Li, Pan Li | Published: 2025-09-27 | Updated: 2025-10-13
Hallucination
Privacy Enhancing Technology
倫理的選択評価

MaskSQL: Safeguarding Privacy for LLM-Based Text-to-SQL via Abstraction

Authors: Sepideh Abedini, Shubhankar Mohapatra, D. B. Emerson, Masoumeh Shafieinejad, Jesse C. Cresswell, Xi He | Published: 2025-09-27 | Updated: 2025-09-30
SQLクエリ生成
Prompt Injection
Prompt leaking

LLM Watermark Evasion via Bias Inversion

Authors: Jeongyeon Hwang, Sangdon Park, Jungseul Ok | Published: 2025-09-27 | Updated: 2025-10-01
Disabling Safety Mechanisms of LLM
Model Inversion
Statistical Testing