Literature Database

LeechHijack: Covert Computational Resource Exploitation in Intelligent Agent Systems

Authors: Yuanhe Zhang, Weiliu Wang, Zhenhong Zhou, Kun Wang, Jie Zhang, Li Sun, Yang Liu, Sen Su | Published: 2025-12-02
Indirect Prompt Injection
Cybersecurity
Backdoor Attack

COGNITION: From Evaluation to Defense against Multimodal LLM CAPTCHA Solvers

Authors: Junyu Wang, Changjia Zhu, Yuanbo Zhou, Lingyao Li, Xu He, Junjie Xiong | Published: 2025-12-02
Prompt leaking
Model Performance Evaluation
Model Extraction Attack

OmniGuard: Unified Omni-Modal Guardrails with Deliberate Reasoning

Authors: Boyu Zhu, Xiaofei Wen, Wenjie Jacky Mo, Tinghui Zhu, Yanan Xie, Peng Qi, Muhao Chen | Published: 2025-12-02
Privacy Management
マルチモーダル安全性
Ethical Considerations

Quantum Vanguard: Server Optimized Privacy Fortified Federated Intelligence for Future Vehicles

Authors: Dev Gurung, Shiva Raj Pokhrel | Published: 2025-12-02
Privacy Protection
Federated Learning
Quantum Cryptanalysis

Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration

Authors: Francesco Greco, Giuseppe Desolda, Cesare Tucci, Andrea Esposito, Antonio Curci, Antonio Piccinno | Published: 2025-12-01
Indirect Prompt Injection
Cybersecurity
Training Method

AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data

Authors: Benjamin Blakely, Yeni Li, Akshay Dave, Derek Kultgen, Rick Vilim | Published: 2025-12-01
Cybersecurity
Anomaly Detection Method
Watermarking Technology

Demystifying Feature Engineering in Malware Analysis of API Call Sequences

Authors: Tianheng Qu, Hongsong Zhu, Limin Sun, Haining Wang, Haiqiang Fei, Zheng He, Zhi Li | Published: 2025-12-01
Cybersecurity
Dataset Generation
Feature Extraction

A Wolf in Sheep’s Clothing: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search

Authors: Rongzhe Wei, Peizhi Niu, Xinjie Shen, Tony Tu, Yifan Li, Ruihan Wu, Eli Chien, Olgica Milenkovic, Pan Li | Published: 2025-12-01
Training Method
Prompt Injection
Ethical Considerations

EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations

Authors: Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong | Published: 2025-12-01
Poisoning attack on RAG
Cybersecurity
Data Contamination Detection

Securing Large Language Models (LLMs) from Prompt Injection Attacks

Authors: Omar Farooq Khan Suri, John McCrae | Published: 2025-12-01
Indirect Prompt Injection
Cybersecurity
Effectiveness Analysis of Defense Methods