KubeGuard: LLM-Assisted Kubernetes Hardening via Configuration Files and Runtime Logs Analysis Authors: Omri Sgan Cohen, Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai | Published: 2025-09-04 Security Strategy GenerationNetwork Forensics監査ログ分析 2025.09.04 2025.09.06 Literature Database
NeuroBreak: Unveil Internal Jailbreak Mechanisms in Large Language Models Authors: Chuhan Zhang, Ye Zhang, Bowen Shi, Yuyou Gan, Tianyu Du, Shouling Ji, Dazhan Deng, Yingcai Wu | Published: 2025-09-04 Prompt Injection神経細胞と安全性Defense Mechanism 2025.09.04 2025.09.06 Literature Database
Federated Learning: An approach with Hybrid Homomorphic Encryption Authors: Pedro Correia, Ivan Silva, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-09-03 Integration of FL and HEPrivacy Design PrinciplesFederated Learning 2025.09.03 2025.09.05 Literature Database
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities Authors: Weizhe Wang, Wei Ma, Qiang Hu, Yao Zhang, Jianfei Sun, Bin Wu, Yang Liu, Guangquan Xu, Lingxiao Jiang | Published: 2025-09-03 Prompt InjectionLarge Language ModelVulnerability Analysis 2025.09.03 2025.09.05 Literature Database
A Comprehensive Guide to Differential Privacy: From Theory to User Expectations Authors: Napsu Karmitsa, Antti Airola, Tapio Pahikkala, Tinja Pitkämäki | Published: 2025-09-03 Detection of Poison Data for Backdoor AttacksPrivacy Design PrinciplesDifferential Privacy 2025.09.03 2025.09.05 Literature Database
PromptCOS: Towards System Prompt Copyright Auditing for LLMs via Content-level Output Similarity Authors: Yuchen Yang, Yiming Li, Hongwei Yao, Enhao Huang, Shuo Shao, Bingrun Yang, Zhibo Wang, Dacheng Tao, Zhan Qin | Published: 2025-09-03 Prompt validationPrompt leakingModel Extraction Attack 2025.09.03 2025.09.05 Literature Database
EverTracer: Hunting Stolen Large Language Models via Stealthy and Robust Probabilistic Fingerprint Authors: Zhenhua Xu, Meng Han, Wenpeng Xing | Published: 2025-09-03 Disabling Safety Mechanisms of LLMData Protection MethodPrompt validation 2025.09.03 2025.09.05 Literature Database
E-PhishGen: Unlocking Novel Research in Phishing Email Detection Authors: Luca Pajola, Eugenio Caripoti, Stefan Banzer, Simeone Pizzi, Mauro Conti, Giovanni Apruzzese | Published: 2025-09-01 | Updated: 2025-09-15 データセットの問題Phishing DetectionMachine Learning 2025.09.01 2025.09.17 Literature Database
RepoMark: A Data-Usage Auditing Framework for Code Large Language Models Authors: Wenjie Qu, Yuguang Zhou, Bo Wang, Yuexin Li, Lionel Z. Wang, Jinyuan Jia, Jiaheng Zhang | Published: 2025-08-29 | Updated: 2025-11-03 Privacy ProtectionInformation Flow AnalysisDigital Watermarking for Generative AI 2025.08.29 2025.11.05 Literature Database
PromptSleuth: Detecting Prompt Injection via Semantic Intent Invariance Authors: Mengxiao Wang, Yuxuan Zhang, Guofei Gu | Published: 2025-08-28 Indirect Prompt InjectionPrompt InjectionPrompt validation 2025.08.28 2025.09.01 Literature Database