Literature Database

A Practical and Secure Byzantine Robust Aggregator

Authors: De Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang | Published: 2025-06-29 | Updated: 2025-07-02
Poisoning attack on RAG
Poisoning Attack
Robust Classification

MetaCipher: A Time-Persistent and Universal Multi-Agent Framework for Cipher-Based Jailbreak Attacks for LLMs

Authors: Boyuan Chen, Minghao Shao, Abdul Basit, Siddharth Garg, Muhammad Shafique | Published: 2025-06-27 | Updated: 2025-08-13
Framework
Large Language Model
脱獄攻撃手法

ZKPROV: A Zero-Knowledge Approach to Dataset Provenance for Large Language Models

Authors: Mina Namazi, Alexander Nemecek, Erman Ayday | Published: 2025-06-26
Privacy Protection
Large Language Model
Watermarking Technology

Counterfactual Influence as a Distributional Quantity

Authors: Matthieu Meeus, Igor Shilov, Georgios Kaissis, Yves-Alexandre de Montjoye | Published: 2025-06-25
Privacy Protection
Performance Evaluation Metrics
評価メトリクス

SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models

Authors: Dipayan Saha, Shams Tarek, Hasan Al Shaikh, Khan Thamid Hasan, Pavan Sai Nalluri, Md. Ajoad Hasan, Nashmin Alam, Jingbo Zhou, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2025-06-25
セキュリティ検証手法
Prompt Injection
Large Language Model

Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU

Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25
Prompt Injection
Memory Management Method
Evaluation Method

JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation

Authors: Guoqiang Chen, Xin Jin, Zhiqiang Lin | Published: 2025-06-25
Indirect Prompt Injection
コード脆弱性修復
Evaluation Method

Machine Learning with Privacy for Protected Attributes

Authors: Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri | Published: 2025-06-24
プライバシーと最適化
Privacy-Preserving Data Mining
Differential Privacy

KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs

Authors: Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi | Published: 2025-06-24
Model Inversion
攻撃戦略分析
Feature Extraction

A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures

Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han | Published: 2025-06-24
AIエージェント通信
Poisoning attack on RAG
Prompt validation