Literature Database

E-PhishGen: Unlocking Novel Research in Phishing Email Detection

Authors: Luca Pajola, Eugenio Caripoti, Stefan Banzer, Simeone Pizzi, Mauro Conti, Giovanni Apruzzese | Published: 2025-09-01 | Updated: 2025-09-15
データセットの問題
Phishing Detection
Machine Learning

RepoMark: A Data-Usage Auditing Framework for Code Large Language Models

Authors: Wenjie Qu, Yuguang Zhou, Bo Wang, Yuexin Li, Lionel Z. Wang, Jinyuan Jia, Jiaheng Zhang | Published: 2025-08-29 | Updated: 2025-11-03
Privacy Protection
Information Flow Analysis
Digital Watermarking for Generative AI

PromptSleuth: Detecting Prompt Injection via Semantic Intent Invariance

Authors: Mengxiao Wang, Yuxuan Zhang, Guofei Gu | Published: 2025-08-28
Indirect Prompt Injection
Prompt Injection
Prompt validation

AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning

Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28
Poisoning attack on RAG
Indirect Prompt Injection
Vulnerability Analysis

Multi-Agent Penetration Testing AI for the Web

Authors: Isaac David, Arthur Gervais | Published: 2025-08-28
Indirect Prompt Injection
Security Testing
Vulnerability Analysis

CyberSleuth: Autonomous Blue-Team LLM Agent for Web Attack Forensics

Authors: Stefano Fumero, Kai Huang, Matteo Boffa, Danilo Giordano, Marco Mellia, Zied Ben Houidi, Dario Rossi | Published: 2025-08-28
Indirect Prompt Injection
Website Vulnerability
フォレンジック調査

Human-AI Collaborative Bot Detection in MMORPGs

Authors: Jaeman Son, Hyunsoo Kim | Published: 2025-08-28
Indirect Prompt Injection
Framework
Education and Follow-up

Ransomware 3.0: Self-Composing and LLM-Orchestrated

Authors: Md Raz, Meet Udeshi, P. V. Sai Charan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2025-08-28
Data Generation
Attack Action Model
暗号化アルゴリズム

Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning

Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27
RAG
Poisoning attack on RAG
Prompt Injection

SoK: Large Language Model Copyright Auditing via Fingerprinting

Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27
LLMフィンガープリンティング
RAG
Prompt Engineering