Literature Database

CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations

Authors: Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran | Published: 2025-05-14
Testbed
Attack Detection Method
電子制御ユニット

MorphMark: Flexible Adaptive Watermarking for Large Language Models

Authors: Zongqi Wang, Tianle Gu, Baoyuan Wu, Yujiu Yang | Published: 2025-05-14 | Updated: 2025-05-20
Text Generation Method
Digital Watermarking for Generative AI
Watermark Robustness

Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems

Authors: Mostafa Jafari, Alireza Shameli-Sendi | Published: 2025-05-14
Robustness Analysis
Attack Detection Method
Adversarial Learning

Instantiating Standards: Enabling Standard-Driven Text TTP Extraction with Evolvable Memory

Authors: Cheng Meng, ZhengWei Jiang, QiuYun Wang, XinYi Li, ChunYan Ma, FangMing Dong, FangLi Ren, BaoXu Liu | Published: 2025-05-14
Prompt leaking
Attack Detection Method
Knowledge Extraction Method

Toward Malicious Clients Detection in Federated Learning

Authors: Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang | Published: 2025-05-14
Trigger Detection
Poisoning
悪意のあるクライアント検出

Securing RAG: A Risk Assessment and Mitigation Framework

Authors: Lukas Ammann, Sara Ott, Christoph R. Landolt, Marco P. Lehmann | Published: 2025-05-13 | Updated: 2025-05-21
LLM Security
RAG
Poisoning attack on RAG

MUBox: A Critical Evaluation Framework of Deep Machine Unlearning

Authors: Xiang Li, Bhavani Thuraisingham, Wenqi Wei | Published: 2025-05-13
Class Based Forgetting Evaluation
Detection of Poisonous Data
Watermarking Technology

Privacy-Preserving Analytics for Smart Meter (AMI) Data: A Hybrid Approach to Comply with CPUC Privacy Regulations

Authors: Benjamin Westrich | Published: 2025-05-13
Detection of Poison Data for Backdoor Attacks
Privacy Design Principles
Cryptography

Securing WiFi Fingerprint-based Indoor Localization Systems from Malicious Access Points

Authors: Fariha Tanjim Shifat, Sayma Sarwar Ela, Mosarrat Jahan | Published: 2025-05-12
Reliability Assessment
Machine Learning Technology
Anomaly Detection Method

SecReEvalBench: A Multi-turned Security Resilience Evaluation Benchmark for Large Language Models

Authors: Huining Cui, Wei Liu | Published: 2025-05-12
LLM Security
Prompt Injection
Prompt leaking