Literature Database

Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools

Authors: Ping He, Changjiang Li, Binbin Zhao, Tianyu Du, Shouling Ji | Published: 2025-09-25
Indirect Prompt Injection
ツール使用分析
自動生成フレームワーク

Dual-Path Phishing Detection: Integrating Transformer-Based NLP with Structural URL Analysis

Authors: Ibrahim Altan, Abdulla Bachir, Yousuf Parbhulkar, Abdul Muksith Rizvi, Moshiur Farazi | Published: 2025-09-25
フィッシング攻撃の傾向
Analysis of Detection Methods
Natural Language Processing

RLCracker: Exposing the Vulnerability of LLM Watermarks with Adaptive RL Attacks

Authors: Hanbo Huang, Yiran Zhang, Hao Zheng, Xuan Gong, Yihan Li, Lin Liu, Shiyu Liang | Published: 2025-09-25
Disabling Safety Mechanisms of LLM
Prompt Injection
Watermark Design

FlowXpert: Context-Aware Flow Embedding for Enhanced Traffic Detection in IoT Network

Authors: Chao Zha, Haolin Pan, Bing Bai, Jiangxing Wu, Ruyun Zhang | Published: 2025-09-25
トラフィック分類
Network Threat Detection
Analysis of Detection Methods

ExpIDS: A Drift-adaptable Network Intrusion Detection System With Improved Explainability

Authors: Ayush Kumar, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-09-25
XAI (Explainable AI)
Network Threat Detection
Anomaly Detection Method

Cryptographic Backdoor for Neural Networks: Boon and Bane

Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25
Trigger Detection
Backdoor Attack
Watermark Design

Can Federated Learning Safeguard Private Data in LLM Training? Vulnerabilities, Attacks, and Defense Evaluation

Authors: Wenkai Guo, Xuefeng Liu, Haolin Wang, Jianwei Niu, Shaojie Tang, Jing Yuan | Published: 2025-09-25
Privacy Protection Method
Prompt Injection
Poisoning

A Framework for Rapidly Developing and Deploying Protection Against Large Language Model Attacks

Authors: Adam Swanda, Amy Chang, Alexander Chen, Fraser Burch, Paul Kassianik, Konstantin Berlin | Published: 2025-09-25
Indirect Prompt Injection
Security Metric
Prompt Injection

RAG Security and Privacy: Formalizing the Threat Model and Attack Surface

Authors: Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta | Published: 2025-09-24
RAG
Poisoning attack on RAG
Privacy Protection Method

Investigating Security Implications of Automatically Generated Code on the Software Supply Chain

Authors: Xiaofan Li, Xing Gao | Published: 2025-09-24
Alignment
Indirect Prompt Injection
Vulnerability Research