Literature Database

SPEAR++: Scaling Gradient Inversion via Sparsely-Used Dictionary Learning

Authors: Alexander Bakarsky, Dimitar I. Dimitrov, Maximilian Baader, Martin Vechev | Published: 2025-10-28
Impact of Sparsity
Privacy Protection
Effectiveness Analysis of Defense Methods

LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models

Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28
RAG
Prompt Injection
Anomaly Detection in Logs

Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks

Authors: Yaokai Feng, Kouichi Sakurai | Published: 2025-10-27
LLMsによる攻撃手法
Cyber Threat Intelligence
Prompt Injection

Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing

Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27
Software Security
Performance Evaluation Method
Vulnerability detection

Fast-MIA: Efficient and Scalable Membership Inference for LLMs

Authors: Hiromu Takahashi, Shotaro Ishihara | Published: 2025-10-27
Privacy Protection Method
Prompt leaking
Computational Efficiency

Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies

Authors: Bin Wang, YiLu Zhong, MiDi Wan, WenJie Yu, YuanBing Ouyang, Yenan Huang, Hui Li | Published: 2025-10-27
Software Security
Prompt Injection
Prompt leaking

Securing AI Agent Execution

Authors: Christoph Bühler, Matteo Biagiola, Luca Di Grazia, Guido Salvaneschi | Published: 2025-10-24 | Updated: 2025-10-29
Indirect Prompt Injection
Model Extraction Attack
Dynamic Access Control

RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines

Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23
RAG
Poisoning attack on RAG
Cyber Threat Intelligence

Learning to Triage Taint Flows Reported by Dynamic Program Analysis in Node.js Packages

Authors: Ronghao Ni, Aidan Z. H. Yang, Min-Chien Hsu, Nuno Sabino, Limin Jia, Ruben Martins, Darion Cassel, Kevin Cheang | Published: 2025-10-23
Node.js脆弱性評価
Training Method
脆弱性検出手法

Black Box Absorption: LLMs Undermining Innovative Ideas

Authors: Wenjun Cao | Published: 2025-10-23
Relationship of AI Systems
イノベーション経済学
Intellectual Property Protection