Literature Database

SoK: How Sensor Attacks Disrupt Autonomous Vehicles: An End-to-end Analysis, Challenges, and Missed Threats

Authors: Qingzhao Zhang, Shaocheng Luo, Z. Morley Mao, Miroslav Pajic, Michael K. Reiter | Published: 2025-09-14 | Updated: 2025-09-16
システムエラープロパゲーション
Prompt Injection
Attack Type

SME-TEAM: Leveraging Trust and Ethics for Secure and Responsible Use of AI and LLMs in SMEs

Authors: Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, Leandros Maglaras | Published: 2025-09-12 | Updated: 2025-11-05
人間とAIの協力
Creation of Fair AI Models
Transparency and Verification

Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector

Authors: Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirmare, Vivek Balachandran, Tamal Das | Published: 2025-09-11
Algorithm
Data Collection Method
Phishing Detection

What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion Detection Datasets

Authors: Meghan Wilkinson, Robert H Thomson | Published: 2025-09-11
Algorithm
Network Forensics
Anomaly Detection Algorithm

ENSI: Efficient Non-Interactive Secure Inference for Large Language Models

Authors: Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu | Published: 2025-09-11
Algorithm
Model Inversion
Efficiency Evaluation

What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection

Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11
Vulnerabilities of IoT Devices
形式モデル
Vulnerability Assessment Method

Enabling Regulatory Multi-Agent Collaboration: Architecture, Challenges, and Solutions

Authors: Qinnan Hu, Yuntao Wang, Yuan Gao, Zhou Su, Linkang Du | Published: 2025-09-11
Relationship of AI Systems
倫理基準遵守
Anomaly Detection Method

Character-Level Perturbations Disrupt LLM Watermarks

Authors: Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, He Zhang, Shirui Pan, Bo Liu, Asif Qumer Gill, Leo Yu Zhang | Published: 2025-09-11
Attack Method
Digital Watermarking for Generative AI
Watermark Design

AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System

Authors: Chanti Raju Mylay, Bobin Deng, Zhipeng Cai, Honghui Xu | Published: 2025-09-11
Prompt Injection
作物病害管理
農薬使用法

DP-FedLoRA: Privacy-Enhanced Federated Fine-Tuning for On-Device Large Language Models

Authors: Honghui Xu, Shiva Shrestha, Wei Chen, Zhiyuan Li, Zhipeng Cai | Published: 2025-09-11
Privacy Technique
Convergence Analysis
Differential Privacy