QRïS: A Preemptive Novel Method for Quishing Detection Through Structural Features of QR Authors: Muhammad Wahid Akram, Keshav Sood, Muneeb Ul Hassan | Published: 2025-10-20 QRコード分類手法Feature Importance Analysis評価メトリクス 2025.10.20 2025.10.22 Literature Database
SentinelNet: Safeguarding Multi-Agent Collaboration Through Credit-Based Dynamic Threat Detection Authors: Yang Feng, Xudong Pan | Published: 2025-10-17 | Updated: 2025-10-21 エージェント設計Network Threat DetectionModel Robustness 2025.10.17 2025.10.23 Literature Database
SoK: Taxonomy and Evaluation of Prompt Security in Large Language Models Authors: Hanbin Hong, Shuya Feng, Nima Naderloui, Shenao Yan, Jingyu Zhang, Biying Liu, Ali Arastehfard, Heqing Huang, Yuan Hong | Published: 2025-10-17 | Updated: 2025-10-21 LLM Securityシナリオベースの悪用Large Language Model 2025.10.17 2025.10.23 Literature Database
OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs Authors: Ahmed Aly, Essam Mansour, Amr Youssef | Published: 2025-10-16 | Updated: 2025-10-20 APT攻撃調査GNNベースの異常検知Anomaly Detection Method 2025.10.16 2025.10.22 Literature Database
A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems Authors: Zixuan Liu, Yi Zhao, Zhuotao Liu, Qi Li, Chuanpu Fu, Guangmeng Zhou, Ke Xu | Published: 2025-10-16 Modification of Network TrafficBotnet TrafficModel Extraction Attack 2025.10.16 2025.10.18 Literature Database
Secure Sparse Matrix Multiplications and their Applications to Privacy-Preserving Machine Learning Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2025-10-16 Data ProtectionPrivacy-Preserving Machine LearningDifferential Privacy 2025.10.16 2025.10.18 Literature Database
LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet? Authors: Bin Liu, Yanjie Zhao, Guoai Xu, Haoyu Wang | Published: 2025-10-16 Indirect Prompt Injectionエージェント設計Security Analysis 2025.10.16 2025.10.18 Literature Database
Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration Authors: Evangelos Lamprou, Julian Dai, Grigoris Ntousakis, Martin C. Rinard, Nikos Vasilakis | Published: 2025-10-16 Security AnalysisProgram VerificationPrompt leaking 2025.10.16 2025.10.18 Literature Database
Are My Optimized Prompts Compromised? Exploring Vulnerabilities of LLM-based Optimizers Authors: Andrew Zhao, Reshmi Ghosh, Vitor Carvalho, Emily Lawton, Keegan Hines, Gao Huang, Jack W. Stokes | Published: 2025-10-16 Prompt InjectionPrompt leakingLarge Language Model 2025.10.16 2025.10.18 Literature Database
Terrarium: Revisiting the Blackboard for Multi-Agent Safety, Privacy, and Security Studies Authors: Mason Nakamura, Abhinav Kumar, Saaduddin Mahmud, Sahar Abdelnabi, Shlomo Zilberstein, Eugene Bagdasarian | Published: 2025-10-16 エージェント設計Large Language Model通信プロトコル 2025.10.16 2025.10.18 Literature Database