LLM Jailbreak Detection for (Almost) Free! Authors: Guorui Chen, Yifan Xia, Xiaojun Jia, Zhijiang Li, Philip Torr, Jindong Gu | Published: 2025-09-18 Large Language ModelEvaluation MethodWatermarking Technology 2025.09.18 2025.09.20 Literature Database
BEACON: Behavioral Malware Classification with Large Language Model Embeddings and Deep Learning Authors: Wadduwage Shanika Perera, Haodi Jiang | Published: 2025-09-18 Malware Detection ScenarioBehavior Analysis MethodEvaluation Method 2025.09.18 2025.09.20 Literature Database
Defending Diffusion Models Against Membership Inference Attacks via Higher-Order Langevin Dynamics Authors: Benjamin Sterling, Yousef El-Laham, Mónica F. Bugallo | Published: 2025-09-17 Privacy AnalysisDiffusion ModelGenerative Model Characteristics 2025.09.17 2025.09.19 Literature Database
Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response Authors: Ozer Ozturk, Busra Buyuktanir, Gozde Karatas Baydogmus, Kazim Yildiz | Published: 2025-09-17 AlgorithmPrivacy AnalysisDifferential Privacy 2025.09.17 2025.09.19 Literature Database
Who Taught the Lie? Responsibility Attribution for Poisoned Knowledge in Retrieval-Augmented Generation Authors: Baolei Zhang, Haoran Xin, Yuxi Chen, Zhuqing Liu, Biao Yi, Tong Li, Lihai Nie, Zheli Liu, Minghong Fang | Published: 2025-09-17 Poisoning attack on RAGEvaluation Method責任帰属システム設計 2025.09.17 2025.09.19 Literature Database
Secure UAV-assisted Federated Learning: A Digital Twin-Driven Approach with Zero-Knowledge Proofs Authors: Md Bokhtiar Al Zami, Md Raihan Uddin, Dinh C. Nguyen | Published: 2025-09-17 Energy Managementデジタルツイン技術Federated Learning 2025.09.17 2025.09.19 Literature Database
Privacy-Aware In-Context Learning for Large Language Models Authors: Bishnu Bhusal, Manoj Acharya, Ramneet Kaur, Colin Samplawski, Anirban Roy, Adam D. Cobb, Rohit Chadha, Susmit Jha | Published: 2025-09-17 Differential PrivacyInformation ExtractionWatermark 2025.09.17 2025.09.19 Literature Database
A Multi-Agent LLM Defense Pipeline Against Prompt Injection Attacks Authors: S M Asif Hossain, Ruksat Khan Shayoni, Mohd Ruhul Ameen, Akif Islam, M. F. Mridha, Jungpil Shin | Published: 2025-09-16 | Updated: 2025-10-01 Indirect Prompt InjectionPrompt InjectionDecentralized LLM Architecture 2025.09.16 2025.10.03 Literature Database
Sy-FAR: Symmetry-based Fair Adversarial Robustness Authors: Haneen Najjar, Eyal Ronen, Mahmood Sharif | Published: 2025-09-16 Ensuring FairnessAdversarial Learningevaluation metrics 2025.09.16 2025.09.18 Literature Database
Jailbreaking Large Language Models Through Content Concretization Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-09-16 Prompt InjectionModel Evaluationevaluation metrics 2025.09.16 2025.09.18 Literature Database