AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios Authors: Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai | Published: 2025-10-29 サービスの構成Network Node ConfigurationPerformance Evaluation 2025.10.29 2025.10.31 Literature Database
A Novel XAI-Enhanced Quantum Adversarial Networks for Velocity Dispersion Modeling in MaNGA Galaxies Authors: Sathwik Narkedimilli, N V Saran Kumar, Aswath Babu H, Manjunath K Vanahalli, Manish M, Vinija Jain, Aman Chadha | Published: 2025-10-28 Performance EvaluationModel evaluation methodsQuantum Information and Quantum Computing 2025.10.28 2025.10.30 Literature Database
Design and Optimization of Cloud Native Homomorphic Encryption Workflows for Privacy-Preserving ML Inference Authors: Tejaswini Bollikonda | Published: 2025-10-28 Privacy ProtectionEncryption Technology暗号化環境でのデータ処理 2025.10.28 2025.10.30 Literature Database
Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28 RAGTCP Connection CharacteristicsVulnerability Analysis 2025.10.28 2025.10.30 Literature Database
SPEAR++: Scaling Gradient Inversion via Sparsely-Used Dictionary Learning Authors: Alexander Bakarsky, Dimitar I. Dimitrov, Maximilian Baader, Martin Vechev | Published: 2025-10-28 Impact of SparsityPrivacy ProtectionEffectiveness Analysis of Defense Methods 2025.10.28 2025.10.30 Literature Database
LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28 RAGPrompt InjectionAnomaly Detection in Logs 2025.10.28 2025.10.30 Literature Database
Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks Authors: Yaokai Feng, Kouichi Sakurai | Published: 2025-10-27 LLMsによる攻撃手法Cyber Threat IntelligencePrompt Injection 2025.10.27 2025.10.29 Literature Database
Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27 Software SecurityPerformance Evaluation MethodVulnerability detection 2025.10.27 2025.10.29 Literature Database
Fast-MIA: Efficient and Scalable Membership Inference for LLMs Authors: Hiromu Takahashi, Shotaro Ishihara | Published: 2025-10-27 Privacy Protection MethodPrompt leakingComputational Efficiency 2025.10.27 2025.10.29 Literature Database
Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies Authors: Bin Wang, YiLu Zhong, MiDi Wan, WenJie Yu, YuanBing Ouyang, Yenan Huang, Hui Li | Published: 2025-10-27 Software SecurityPrompt InjectionPrompt leaking 2025.10.27 2025.10.29 Literature Database