ACE: A Security Architecture for LLM-Integrated App Systems Authors: Evan Li, Tushin Mallick, Evan Rose, William Robertson, Alina Oprea, Cristina Nita-Rotaru | Published: 2025-04-29 | Updated: 2025-05-07 Indirect Prompt InjectionPrompt InjectionInformation Flow Analysis 2025.04.29 2025.05.27 Literature Database
Secure Coding with AI, From Creation to Inspection Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29 Dataset ApplicabilityProgram AnalysisVulnerability Management 2025.04.29 2025.05.27 Literature Database
Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications Authors: Weizhe Wang, Yao Zhang, Kaitai Liang, Guangquan Xu, Hongpeng Bai, Qingyang Yan, Xi Zheng, Bin Wu | Published: 2025-04-29 | Updated: 2025-04-30 Content Compression TechniquesUser Behavior AnalysisVulnerability Assessment Method 2025.04.29 2025.05.27 Literature Database
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks Authors: Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry | Published: 2025-04-29 Online LearningPoisoningPerformance Evaluation 2025.04.29 2025.05.27 Literature Database
Learning and Generalization with Mixture Data Authors: Harsh Vardhan, Avishek Ghosh, Arya Mazumdar | Published: 2025-04-29 Sample ComplexityMathematical FoundationsDetection of Poisonous Data 2025.04.29 2025.05.27 Literature Database
The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models Authors: Swaroop Dora, Deven Lunkad, Naziya Aslam, S. Venkatesan, Sandeep Kumar Shukla | Published: 2025-04-29 Indirect Prompt InjectionSecure Communication ChannelVulnerability Assessment Method 2025.04.29 2025.05.27 Literature Database
ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models Authors: Jin Xie, Ruishi He, Songze Li, Xiaojun Jia, Shouling Ji | Published: 2025-04-29 Backdoor DetectionPrivacy ViolationAttack Method 2025.04.29 2025.05.27 Literature Database
Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM Reasoning via Adaptive Token Compression Authors: Yu Cui, Yujun Cai, Yiwei Wang | Published: 2025-04-29 Token Compression FrameworkPrompt InjectionAttack Method 2025.04.29 2025.05.27 Literature Database
Robustness via Referencing: Defending against Prompt Injection Attacks by Referencing the Executed Instruction Authors: Yulin Chen, Haoran Li, Yuan Sui, Yue Liu, Yufei He, Yangqiu Song, Bryan Hooi | Published: 2025-04-29 Indirect Prompt InjectionPrompt validationAttack Method 2025.04.29 2025.05.27 Literature Database
Network Attack Traffic Detection With Hybrid Quantum-Enhanced Convolution Neural Network Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-04-29 Performance Evaluation MethodAttack DetectionQuantum Framework 2025.04.29 2025.05.27 Literature Database