Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo | Published: 2025-05-06 Prompt leakingAttack TypeTaxonomy of Attacks 2025.05.06 2025.05.27 Literature Database
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06 Attack TypeAdversarial ExampleMachine Learning Technology 2025.05.06 2025.05.27 Literature Database
Towards a standardized methodology and dataset for evaluating LLM-based digital forensic timeline analysis Authors: Hudan Studiawan, Frank Breitinger, Mark Scanlon | Published: 2025-05-06 LLM Performance EvaluationLarge Language ModelEvaluation Method 2025.05.06 2025.05.27 Literature Database
Acoustic Side-Channel Attacks on a Computer Mouse Authors: Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik | Published: 2025-05-05 Changes in User BehaviorMachine Learning TechnologySpeech Recognition System 2025.05.05 2025.05.27 Literature Database
Unveiling the Landscape of LLM Deployment in the Wild: An Empirical Study Authors: Xinyi Hou, Jiahao Han, Yanjie Zhao, Haoyu Wang | Published: 2025-05-05 API SecurityIndirect Prompt InjectionPrompt leaking 2025.05.05 2025.05.27 Literature Database
Bayesian Robust Aggregation for Federated Learning Authors: Aleksandr Karakulev, Usama Zafar, Salman Toor, Prashant Singh | Published: 2025-05-05 Group-Based RobustnessTrigger DetectionAdversarial Learning 2025.05.05 2025.05.27 Literature Database
Advancing Email Spam Detection: Leveraging Zero-Shot Learning and Large Language Models Authors: Ghazaleh SHirvani, Saeid Ghasemshirazi | Published: 2025-05-05 Online LearningApplication of Text ClassificationMachine Learning Technology 2025.05.05 2025.05.27 Literature Database
Quantum Support Vector Regression for Robust Anomaly Detection Authors: Kilian Tscharke, Maximilian Wendlinger, Sebastian Issel, Pascal Debus | Published: 2025-05-02 | Updated: 2025-05-13 Certified RobustnessAnomaly Detection MethodRole of Quantum Machine Learning 2025.05.02 2025.05.28 Literature Database
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks Authors: Leonid Legashev, Artur Zhigalov, Denis Parfenov | Published: 2025-05-01 Backdoor AttackPoisoningAttack Type 2025.05.01 2025.05.27 Literature Database
LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems Authors: Yazan Otoum, Arghavan Asad, Amiya Nayak | Published: 2025-05-01 | Updated: 2025-05-13 Bias Detection in AI OutputLLM Performance EvaluationPrompt Injection 2025.05.01 2025.05.27 Literature Database