Towards Confidential and Efficient LLM Inference with Dual Privacy Protection Authors: Honglan Yu, Yibin Wang, Feifei Dai, Dong Liu, Haihui Fan, Xiaoyan Gu | Published: 2025-09-11 AlgorithmPrivacy TechniqueDifferential Privacy 2025.09.11 2025.09.13 Literature Database
Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations Authors: Ron F. Del Rosario, Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-09-10 Indirect Prompt InjectionSecurity Information Management計画と実行のパターン 2025.09.10 2025.09.12 Literature Database
Send to which account? Evaluation of an LLM-based Scambaiting System Authors: Hossein Siadati, Haadi Jafarian, Sima Jafarikhah | Published: 2025-09-10 Disabling Safety Mechanisms of LLMResearch Methodology詐欺対策 2025.09.10 2025.09.12 Literature Database
Efficient Decoding Methods for Language Models on Encrypted Data Authors: Matan Avitan, Moran Baruch, Nir Drucker, Itamar Zimerman, Yoav Goldberg | Published: 2025-09-10 HEサンプリング手法Efficiency EvaluationProbability distribution 2025.09.10 2025.09.12 Literature Database
Phish-Blitz: Advancing Phishing Detection with Comprehensive Webpage Resource Collection and Visual Integrity Preservation Authors: Duddu Hriday, Aditya Kulkarni, Vivek Balachandran, Tamal Das | Published: 2025-09-10 Website Vulnerabilityフィッシング攻撃の傾向Visual Similarity Detection 2025.09.10 2025.09.12 Literature Database
An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection Authors: Haywood Gelman, John D. Hastings, David Kenley | Published: 2025-09-08 Prompt InjectionImbalanced DatasetSynthetic Data Generation 2025.09.08 2025.09.10 Literature Database
Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers from LLMs via Claim Verification Authors: Aivin V. Solatorio | Published: 2025-09-08 HallucinationEfficient Proof System監査手法 2025.09.08 2025.09.10 Literature Database
Not All Samples Are Equal: Quantifying Instance-level Difficulty in Targeted Data Poisoning Authors: William Xu, Yiwei Lu, Yihan Wang, Matthew Y. R. Yang, Zuoqiu Liu, Gautam Kamath, Yaoliang Yu | Published: 2025-09-08 Poisoningポイズニング難易度Attack Method 2025.09.08 2025.09.10 Literature Database
EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language Models Authors: Mohammad Reza Mirbagheri, Mohammad Mahdi Mirkamali, Zahra Motoshaker Arani, Ali Javeri, Amir Mahdi Sadeghzadeh, Rasool Jalili | Published: 2025-09-08 Fairness LearningPrompt validation安全性 2025.09.08 2025.09.10 Literature Database
Imitative Membership Inference Attack Authors: Yuntao Du, Yuetian Chen, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-09-08 Experimental ValidationAttack MethodAdversarial Learning 2025.09.08 2025.09.10 Literature Database