Literature Database

ChatGPT: Excellent Paper! Accept It. Editor: Imposter Found! Review Rejected

Authors: Kanchon Gharami, Sanjiv Kumar Sarkar, Yongxin Liu, Shafika Showkat Moni | Published: 2025-12-23
Prompt leaking
Model Extraction Attack
Adversarial Attack Assessment

Optimistic TEE-Rollups: A Hybrid Architecture for Scalable and Verifiable Generative AI Inference on Blockchain

Authors: Aaron Chan, Alex Ding, Frank Chen, Alan Wu, Bruce Zhang, Arther Tian | Published: 2025-12-23
Security Analysis Method
Blockchain Technology
Discussion on Protocol Vulnerabilities and Attack Scenarios

Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography

Authors: Songze Li, Jiameng Cheng, Yiming Li, Xiaojun Jia, Dacheng Tao | Published: 2025-12-23
Disabling Safety Mechanisms of LLM
Prompt Injection
マルチモーダル安全性

Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction

Authors: Anthony Etim, Jakub Szefer | Published: 2025-12-23
Security Analysis Method
Signal Processing
Vulnerability Analysis

On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities

Authors: Sangryu Park, Gihyuk Ko, Homook Cho | Published: 2025-12-23
Prompt Injection
Large Language Model
Vulnerability Analysis

IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense

Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2025-12-23
Backdoor Attack
Poisoning
Generative Model

From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions

Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22
RAG
Data Selection Strategy
Prompt leaking

Causal-Guided Detoxify Backdoor Attack of Open-Weight LoRA Models

Authors: Linzhi Chen, Yang Sun, Hongru Wei, Yuqi Chen | Published: 2025-12-22
Backdoor Detection
Detection of Model Extraction Attacks
Adversarial Attack Assessment

GShield: Mitigating Poisoning Attacks in Federated Learning

Authors: Sameera K. M., Serena Nicolazzo, Antonino Nocera, Vinod P., Rafidha Rehiman K. A | Published: 2025-12-22
データ毒性攻撃
Prompt Injection
Poisoning

Elevating Intrusion Detection and Security Fortification in Intelligent Networks through Cutting-Edge Machine Learning Paradigms

Authors: Md Minhazul Islam Munna, Md Mahbubur Rahman, Jaroslav Frnda, Muhammad Shahid Anwar, Alpamis Kutlimuratov | Published: 2025-12-22
Relationship of AI Systems
Ensemble Learning
Transparency and Verification