Literature Database

PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration

Authors: Yi Liu, Weixiang Han, Chengjun Cai, Xingliang Yuan, Cong Wang | Published: 2025-12-09
Backdoor Detection
Privacy Assurance
Privacy Analysis

Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework

Authors: Sadegh Momeni, Ge Zhang, Birkett Huber, Hamza Harkous, Sam Lipton, Benoit Seguin, Yanis Pavlidis | Published: 2025-12-09
Cybersecurity
Safety of Data Generation
Prompt Injection

Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs

Authors: Yinan Zhong, Qianhao Miao, Yanjiao Chen, Jiangyi Deng, Yushi Cheng, Wenyuan Xu | Published: 2025-12-09
Indirect Prompt Injection
Prompt validation
Large Language Model

Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships

Authors: Bin Wang, Hui Li, Liyang Zhang, Qijia Zhuang, Ao Yang, Dong Zhang, Xijun Luo, Bing Lin | Published: 2025-12-09
Privacy Leakage
偽陽性分析
Information Security

Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem

Authors: Shiva Gaire, Srijan Gyawali, Saroj Mishra, Suman Niroula, Dilip Thakur, Umesh Yadav | Published: 2025-12-09
Poisoning attack on RAG
Cybersecurity
Information Security

A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties

Authors: Jinghao Wang, Ping Zhang, Carter Yagemann | Published: 2025-12-09
Cybersecurity
Privacy Analysis
Clinical Research

Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach

Authors: Hua Yang, Alejandro Velasco, Sen Fang, Bowen Xu, Denys Poshyvanyk | Published: 2025-12-08
Indirect Prompt Injection
Privacy Analysis
因果推論

Privacy Practices of Browser Agents

Authors: Alisha Ukani, Hamed Haddadi, Ali Shahin Shamsabadi, Peter Snyder | Published: 2025-12-08
Indirect Prompt Injection
Privacy Analysis
Information Security

Amulet: Fast TEE-Shielded Inference for On-Device Model Protection

Authors: Zikai Mao, Lingchen Zhao, Lei Xu, Wentao Dong, Shenyi Zhang, Cong Wang, Qian Wang | Published: 2025-12-08
Cybersecurity
Privacy Analysis
Model DoS

ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking

Authors: Yunzhe Li, Jianan Wang, Hongzi Zhu, James Lin, Shan Chang, Minyi Guo | Published: 2025-12-08
DoS Mitigation
Prompt Injection
Model DoS