Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents Authors: Zhixin Lin, Jungang Li, Shidong Pan, Yibo Shi, Yue Yao, Dongliang Xu | Published: 2025-08-27 Indirect Prompt InjectionPrivacy ManagementEducation and Follow-up 2025.08.27 2025.08.29 Literature Database
SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications Authors: Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong | Published: 2025-08-26 Security MetricPrivacy ManagementWatermark 2025.08.26 2025.08.28 Literature Database
The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization Authors: Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes | Published: 2025-08-26 Prompt leakingDifferential Privacy文書プライバシー 2025.08.26 2025.08.28 Literature Database
LLMs in the SOC: An Empirical Study of Human-AI Collaboration in Security Operations Centres Authors: Ronal Singh, Shahroz Tariq, Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris, Martin Lochner | Published: 2025-08-26 Relationship of AI Systemsテーマ分析Expert Opinion Collection 2025.08.26 2025.08.28 Literature Database
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation Authors: Shaswata Mitra, Azim Bazarov, Martin Duclos, Sudip Mittal, Aritran Piplai, Md Rayhanur Rahman, Edward Zieglar, Shahram Rahimi | Published: 2025-08-26 Indirect Prompt InjectionSecurity MetricAutomated Vulnerability Remediation 2025.08.26 2025.08.28 Literature Database
Membership Inference Attacks on LLM-based Recommender Systems Authors: Jiajie He, Yuechun Gu, Min-Chun Chen, Keke Chen | Published: 2025-08-26 Privacy Design PrinciplesPrompt leakingMembership Inference 2025.08.26 2025.08.28 Literature Database
$AutoGuardX$: A Comprehensive Cybersecurity Framework for Connected Vehicles Authors: Muhammad Ali Nadeem, Bishwo Prakash Pokharel, Naresh Kshetri, Achyut Shankar, Gokarna Sharma | Published: 2025-08-25 Hardware Security自動車盗難防止製品安全性 2025.08.25 2025.08.27 Literature Database
Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25 Data Generation MethodTraining MethodWatermark 2025.08.25 2025.08.27 Literature Database
MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs Authors: Tiezhu Sun, Marco Alecci, Aleksandr Pilgun, Yewei Song, Xunzhu Tang, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-08-25 Program Analysisマルウェア分析マルチエージェントシステム 2025.08.25 2025.08.27 Literature Database
A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives Authors: Kaixiang Zhao, Lincan Li, Kaize Ding, Neil Zhenqiang Gong, Yue Zhao, Yushun Dong | Published: 2025-08-20 | Updated: 2025-08-27 Model Extraction AttackIntellectual Property Protection防御手法の統合 2025.08.20 2025.08.29 Literature Database