PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration Authors: Yi Liu, Weixiang Han, Chengjun Cai, Xingliang Yuan, Cong Wang | Published: 2025-12-09 Backdoor DetectionPrivacy AssurancePrivacy Analysis 2025.12.09 2025.12.11 Literature Database
Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework Authors: Sadegh Momeni, Ge Zhang, Birkett Huber, Hamza Harkous, Sam Lipton, Benoit Seguin, Yanis Pavlidis | Published: 2025-12-09 CybersecuritySafety of Data GenerationPrompt Injection 2025.12.09 2025.12.11 Literature Database
Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs Authors: Yinan Zhong, Qianhao Miao, Yanjiao Chen, Jiangyi Deng, Yushi Cheng, Wenyuan Xu | Published: 2025-12-09 Indirect Prompt InjectionPrompt validationLarge Language Model 2025.12.09 2025.12.11 Literature Database
Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships Authors: Bin Wang, Hui Li, Liyang Zhang, Qijia Zhuang, Ao Yang, Dong Zhang, Xijun Luo, Bing Lin | Published: 2025-12-09 Privacy Leakage偽陽性分析Information Security 2025.12.09 2025.12.11 Literature Database
Systematization of Knowledge: Security and Safety in the Model Context Protocol Ecosystem Authors: Shiva Gaire, Srijan Gyawali, Saroj Mishra, Suman Niroula, Dilip Thakur, Umesh Yadav | Published: 2025-12-09 Poisoning attack on RAGCybersecurityInformation Security 2025.12.09 2025.12.11 Literature Database
A Practical Framework for Evaluating Medical AI Security: Reproducible Assessment of Jailbreaking and Privacy Vulnerabilities Across Clinical Specialties Authors: Jinghao Wang, Ping Zhang, Carter Yagemann | Published: 2025-12-09 CybersecurityPrivacy AnalysisClinical Research 2025.12.09 2025.12.11 Literature Database
Understanding Privacy Risks in Code Models Through Training Dynamics: A Causal Approach Authors: Hua Yang, Alejandro Velasco, Sen Fang, Bowen Xu, Denys Poshyvanyk | Published: 2025-12-08 Indirect Prompt InjectionPrivacy Analysis因果推論 2025.12.08 2025.12.10 Literature Database
Privacy Practices of Browser Agents Authors: Alisha Ukani, Hamed Haddadi, Ali Shahin Shamsabadi, Peter Snyder | Published: 2025-12-08 Indirect Prompt InjectionPrivacy AnalysisInformation Security 2025.12.08 2025.12.10 Literature Database
Amulet: Fast TEE-Shielded Inference for On-Device Model Protection Authors: Zikai Mao, Lingchen Zhao, Lei Xu, Wentao Dong, Shenyi Zhang, Cong Wang, Qian Wang | Published: 2025-12-08 CybersecurityPrivacy AnalysisModel DoS 2025.12.08 2025.12.10 Literature Database
ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking Authors: Yunzhe Li, Jianan Wang, Hongzi Zhu, James Lin, Shan Chang, Minyi Guo | Published: 2025-12-08 DoS MitigationPrompt InjectionModel DoS 2025.12.08 2025.12.10 Literature Database