bi-GRPO: Bidirectional Optimization for Jailbreak Backdoor Injection on LLMs Authors: Wence Ji, Jiancan Wu, Aiying Li, Shuyi Zhang, Junkang Wu, An Zhang, Xiang Wang, Xiangnan He | Published: 2025-09-24 Disabling Safety Mechanisms of LLMPrompt InjectionGenerative Model 2025.09.24 2025.09.26 Literature Database
Unmasking Fake Careers: Detecting Machine-Generated Career Trajectories via Multi-layer Heterogeneous Graphs Authors: Michiharu Yamashita, Thanh Tran, Delvin Ce Zhang, Dongwon Lee | Published: 2025-09-24 キャリアデータ生成構造的パターン検出Generative Model Characteristics 2025.09.24 2025.09.26 Literature Database
Defending against Stegomalware in Deep Neural Networks with Permutation Symmetry Authors: Birk Torpmann-Hagen, Michael A. Riegler, Pål Halvorsen, Dag Johansen | Published: 2025-09-23 | Updated: 2025-10-15 Security Analysis MethodCertified RobustnessInformation Hiding Techniques 2025.09.23 2025.10.17 Literature Database
LLMs as verification oracles for Solidity Authors: Massimo Bartoletti, Enrico Lipparini, Livio Pompianu | Published: 2025-09-23 Prompt InjectionModel DoSVulnerability Assessment Method 2025.09.23 2025.09.25 Literature Database
LLM-based Vulnerability Discovery through the Lens of Code Metrics Authors: Felix Weissberg, Lukas Pirch, Erik Imgrund, Jonas Möller, Thorsten Eisenhofer, Konrad Rieck | Published: 2025-09-23 コードメトリクス評価Prompt InjectionLarge Language Model 2025.09.23 2025.09.25 Literature Database
Confidential LLM Inference: Performance and Cost Across CPU and GPU TEEs Authors: Marcin Chrapek, Marcin Copik, Etienne Mettaz, Torsten Hoefler | Published: 2025-09-23 Cost EfficiencyPrivacy-Preserving Machine LearningModel Extraction Attack 2025.09.23 2025.09.25 Literature Database
Detection of security smells in IaC scripts through semantics-aware code and language processing Authors: Aicha War, Adnan A. Rawass, Abdoul K. Kabore, Jordan Samhi, Jacques Klein, Tegawende F. Bissyande | Published: 2025-09-23 コード表現技術Security AnalysisPrompt validation 2025.09.23 2025.09.25 Literature Database
MER-Inspector: Assessing model extraction risks from an attack-agnostic perspective Authors: Xinwei Zhang, Haibo Hu, Qingqing Ye, Li Bai, Huadi Zheng | Published: 2025-09-23 Model Extraction AttackModel DesignRisk Assessment 2025.09.23 2025.09.25 Literature Database
Coherence-driven inference for cybersecurity Authors: Steve Huntsman | Published: 2025-09-23 AlgorithmSecurity AnalysisInformation Gathering Methods 2025.09.23 2025.09.25 Literature Database
Strategic Dishonesty Can Undermine AI Safety Evaluations of Frontier LLM Authors: Alexander Panfilov, Evgenii Kortukov, Kristina Nikolić, Matthias Bethge, Sebastian Lapuschkin, Wojciech Samek, Ameya Prabhu, Maksym Andriushchenko, Jonas Geiping | Published: 2025-09-22 Hallucination武器設計手法Fraud Techniques 2025.09.22 2025.09.24 Literature Database