Literature Database

Demystifying Feature Engineering in Malware Analysis of API Call Sequences

Authors: Tianheng Qu, Hongsong Zhu, Limin Sun, Haining Wang, Haiqiang Fei, Zheng He, Zhi Li | Published: 2025-12-01
Cybersecurity
Dataset Generation
Feature Extraction

A Wolf in Sheep’s Clothing: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search

Authors: Rongzhe Wei, Peizhi Niu, Xinjie Shen, Tony Tu, Yifan Li, Ruihan Wu, Eli Chien, Olgica Milenkovic, Pan Li | Published: 2025-12-01
Training Method
Prompt Injection
Ethical Considerations

EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations

Authors: Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong | Published: 2025-12-01
Poisoning attack on RAG
Cybersecurity
Data Contamination Detection

Securing Large Language Models (LLMs) from Prompt Injection Attacks

Authors: Omar Farooq Khan Suri, John McCrae | Published: 2025-12-01
Indirect Prompt Injection
Cybersecurity
Effectiveness Analysis of Defense Methods

Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation

Authors: Qingyuan Fei, Xin Liu, Song Li, Shujiang Wu, Jianwei Hou, Ping Chen, Zifeng Kang | Published: 2025-12-01
Cybersecurity
Data-Driven Vulnerability Assessment
Hallucination

Benchmarking and Understanding Safety Risks in AI Character Platforms

Authors: Yiluo Wei, Peixian Zhang, Gareth Tyson | Published: 2025-12-01
キャラクターのメタデータ収集
Risk Assessment
Large Language Model

DefenSee: Dissecting Threat from Sight and Text – A Multi-View Defensive Pipeline for Multi-modal Jailbreaks

Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-12-01
Prompt Injection
Model DoS
Robustness Improvement Method

Constructing and Benchmarking: a Labeled Email Dataset for Text-Based Phishing and Spam Detection Framework

Authors: Rebeka Toth, Tamas Bisztray, Richard Dubniczky | Published: 2025-11-26
Social Engineering Attack
Dataset Integration
Prompt Injection

Data Exfiltration by Compression Attack: Definition and Evaluation on Medical Image Data

Authors: Huiyu Li, Nicholas Ayache, Hervé Delingette | Published: 2025-11-26
データ流出に関する分析手法
Data Flow Analysis
Image Processing

GuardTrace-VL: Detecting Unsafe Multimodel Reasoning via Iterative Safety Supervision

Authors: Yuxiao Xiang, Junchi Chen, Zhenchao Jin, Changtao Miao, Haojie Yuan, Qi Chu, Tao Gong, Nenghai Yu | Published: 2025-11-26
Prompt Injection
Risk Assessment Method
Ethical Considerations