Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools Authors: Ping He, Changjiang Li, Binbin Zhao, Tianyu Du, Shouling Ji | Published: 2025-09-25 Indirect Prompt Injectionツール使用分析自動生成フレームワーク 2025.09.25 2025.09.27 Literature Database
Dual-Path Phishing Detection: Integrating Transformer-Based NLP with Structural URL Analysis Authors: Ibrahim Altan, Abdulla Bachir, Yousuf Parbhulkar, Abdul Muksith Rizvi, Moshiur Farazi | Published: 2025-09-25 フィッシング攻撃の傾向Analysis of Detection MethodsNatural Language Processing 2025.09.25 2025.09.27 Literature Database
RLCracker: Exposing the Vulnerability of LLM Watermarks with Adaptive RL Attacks Authors: Hanbo Huang, Yiran Zhang, Hao Zheng, Xuan Gong, Yihan Li, Lin Liu, Shiyu Liang | Published: 2025-09-25 Disabling Safety Mechanisms of LLMPrompt InjectionWatermark Design 2025.09.25 2025.09.27 Literature Database
FlowXpert: Context-Aware Flow Embedding for Enhanced Traffic Detection in IoT Network Authors: Chao Zha, Haolin Pan, Bing Bai, Jiangxing Wu, Ruyun Zhang | Published: 2025-09-25 トラフィック分類Network Threat DetectionAnalysis of Detection Methods 2025.09.25 2025.09.27 Literature Database
ExpIDS: A Drift-adaptable Network Intrusion Detection System With Improved Explainability Authors: Ayush Kumar, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-09-25 XAI (Explainable AI)Network Threat DetectionAnomaly Detection Method 2025.09.25 2025.09.27 Literature Database
Cryptographic Backdoor for Neural Networks: Boon and Bane Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25 Trigger DetectionBackdoor AttackWatermark Design 2025.09.25 2025.09.27 Literature Database
Can Federated Learning Safeguard Private Data in LLM Training? Vulnerabilities, Attacks, and Defense Evaluation Authors: Wenkai Guo, Xuefeng Liu, Haolin Wang, Jianwei Niu, Shaojie Tang, Jing Yuan | Published: 2025-09-25 Privacy Protection MethodPrompt InjectionPoisoning 2025.09.25 2025.09.27 Literature Database
A Framework for Rapidly Developing and Deploying Protection Against Large Language Model Attacks Authors: Adam Swanda, Amy Chang, Alexander Chen, Fraser Burch, Paul Kassianik, Konstantin Berlin | Published: 2025-09-25 Indirect Prompt InjectionSecurity MetricPrompt Injection 2025.09.25 2025.09.27 Literature Database
RAG Security and Privacy: Formalizing the Threat Model and Attack Surface Authors: Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta | Published: 2025-09-24 RAGPoisoning attack on RAGPrivacy Protection Method 2025.09.24 2025.09.26 Literature Database
Investigating Security Implications of Automatically Generated Code on the Software Supply Chain Authors: Xiaofan Li, Xing Gao | Published: 2025-09-24 AlignmentIndirect Prompt InjectionVulnerability Research 2025.09.24 2025.09.26 Literature Database