Literature Database

AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios

Authors: Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai | Published: 2025-10-29
サービスの構成
Network Node Configuration
Performance Evaluation

A Novel XAI-Enhanced Quantum Adversarial Networks for Velocity Dispersion Modeling in MaNGA Galaxies

Authors: Sathwik Narkedimilli, N V Saran Kumar, Aswath Babu H, Manjunath K Vanahalli, Manish M, Vinija Jain, Aman Chadha | Published: 2025-10-28
Performance Evaluation
Model evaluation methods
Quantum Information and Quantum Computing

Design and Optimization of Cloud Native Homomorphic Encryption Workflows for Privacy-Preserving ML Inference

Authors: Tejaswini Bollikonda | Published: 2025-10-28
Privacy Protection
Encryption Technology
暗号化環境でのデータ処理

Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations

Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28
RAG
TCP Connection Characteristics
Vulnerability Analysis

SPEAR++: Scaling Gradient Inversion via Sparsely-Used Dictionary Learning

Authors: Alexander Bakarsky, Dimitar I. Dimitrov, Maximilian Baader, Martin Vechev | Published: 2025-10-28
Impact of Sparsity
Privacy Protection
Effectiveness Analysis of Defense Methods

LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models

Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28
RAG
Prompt Injection
Anomaly Detection in Logs

Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks

Authors: Yaokai Feng, Kouichi Sakurai | Published: 2025-10-27
LLMsによる攻撃手法
Cyber Threat Intelligence
Prompt Injection

Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing

Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27
Software Security
Performance Evaluation Method
Vulnerability detection

Fast-MIA: Efficient and Scalable Membership Inference for LLMs

Authors: Hiromu Takahashi, Shotaro Ishihara | Published: 2025-10-27
Privacy Protection Method
Prompt leaking
Computational Efficiency

Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies

Authors: Bin Wang, YiLu Zhong, MiDi Wan, WenJie Yu, YuanBing Ouyang, Yenan Huang, Hui Li | Published: 2025-10-27
Software Security
Prompt Injection
Prompt leaking