Literature Database

The Attribution Story of WhisperGate: An Academic Perspective

Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21
RAG
Network Threat Detection
Information Leakage Analysis

DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning

Authors: Yixuan Liu, Xinlei Li, Yi Li | Published: 2025-10-21
UI分析
Risk Assessment Method
Malicious Website Detection

Position: LLM Watermarking Should Align Stakeholders’ Incentives for Practical Adoption

Authors: Yepeng Liu, Xuandong Zhao, Dawn Song, Gregory W. Wornell, Yuheng Bu | Published: 2025-10-21
Incentive Mechanism
Digital Watermarking for Generative AI
Robustness of Watermarking Techniques

RESCUE: Retrieval Augmented Secure Code Generation

Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21
Poisoning attack on RAG
Data-Driven Vulnerability Assessment
Prompt leaking

PLAGUE: Plug-and-play framework for Lifelong Adaptive Generation of Multi-turn Exploits

Authors: Neeladri Bhuiya, Madhav Aggarwal, Diptanshu Purwar | Published: 2025-10-20 | Updated: 2025-10-22
Poisoning attack on RAG
攻撃者ターゲット更新
脱獄手法

VERA-V: Variational Inference Framework for Jailbreaking Vision-Language Models

Authors: Qilin Liao, Anamika Lochab, Ruqi Zhang | Published: 2025-10-20
Model DoS
Large Language Model
Untargeted Toxicity Attack

CrossGuard: Safeguarding MLLMs against Joint-Modal Implicit Malicious Attacks

Authors: Xu Zhang, Hao Li, Zhichao Lu | Published: 2025-10-20
Query Generation Method
Prompt Injection
Large Language Model

GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with Denoising Models

Authors: Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento | Published: 2025-10-20
Privacy Analysis
Reconstruction Attack
Federated Learning

Multimodal Safety Is Asymmetric: Cross-Modal Exploits Unlock Black-Box MLLMs Jailbreaks

Authors: Xinkai Wang, Beibei Li, Zerui Shao, Ao Liu, Shouling Ji | Published: 2025-10-20
Disabling Safety Mechanisms of LLM
Prompt Injection
Malicious Content Generation

Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography

Authors: Giulia Giusti | Published: 2025-10-20
Encryption Technology
Watermark Design
Quantum Computing Method