Literature Database

Securing the AI Supply Chain: What Can We Learn From Developer-Reported Security Issues and Solutions of AI Projects?

Authors: The Anh Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2025-12-29
Security Analysis Method
Data-Driven Vulnerability Assessment
Prompt leaking

EquaCode: A Multi-Strategy Jailbreak Approach for Large Language Models via Equation Solving and Code Completion

Authors: Zhen Liang, Hai Huang, Zhengkui Chen | Published: 2025-12-29
Disabling Safety Mechanisms of LLM
LLM活用
Prompt Injection

Certifying the Right to Be Forgotten: Primal-Dual Optimization for Sample and Label Unlearning in Vertical Federated Learning

Authors: Yu Jiang, Xindi Tong, Ziyao Liu, Xiaoxi Zhang, Kwok-Yan Lam, Chee Wei Tan | Published: 2025-12-29
Data Selection Strategy
Machine learning
Convergence analysis

Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems

Authors: Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh | Published: 2025-12-29
RAG
Model DoS
脆弱性優先順位付け

Assessing the Software Security Comprehension of Large Language Models

Authors: Mohammed Latif Siddiq, Natalie Sekerak, Antonio Karam, Maria Leal, Arvin Islam-Gomes, Joanna C. S. Santos | Published: 2025-12-24
Indirect Prompt Injection
Security Analysis Method
脆弱性優先順位付け

Casting a SPELL: Sentence Pairing Exploration for LLM Limitation-breaking

Authors: Yifan Huang, Xiaojun Jia, Wenbo Guo, Yuqiang Sun, Yihao Huang, Chong Wang, Yang Liu | Published: 2025-12-24
Data Selection Strategy
Prompt Injection
Adversarial Attack Detection

Beyond Context: Large Language Models Failure to Grasp Users Intent

Authors: Ahmed M. Hussain, Salahuddin Salahuddin, Panos Papadimitratos | Published: 2025-12-24
Indirect Prompt Injection
マルチモーダル安全性
脆弱性優先順位付け

GateBreaker: Gate-Guided Attacks on Mixture-of-Expert LLMs

Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-12-24
Sparse Model
Prompt leaking
安全性に関連するマルチモーダルなアプローチ

AegisAgent: An Autonomous Defense Agent Against Prompt Injection Attacks in LLM-HARs

Authors: Yihan Wang, Huanqi Yang, Shantanu Pal, Weitao Xu | Published: 2025-12-24
Indirect Prompt Injection
Prompt Injection
Adversarial Attack Assessment

Evasion-Resilient Detection of DNS-over-HTTPS Data Exfiltration: A Practical Evaluation and Toolkit

Authors: Adam Elaoumari | Published: 2025-12-23
Data Extraction and Analysis
Data Flow Analysis
トラフィック分類