STShield: Single-Token Sentinel for Real-Time Jailbreak Detection in Large Language Models Authors: Xunguang Wang, Wenxuan Wang, Zhenlan Ji, Zongjie Li, Pingchuan Ma, Daoyuan Wu, Shuai Wang | Published: 2025-03-23 Prompt InjectionMalicious PromptEffectiveness Analysis of Defense Methods 2025.03.23 2025.05.27 Literature Database
NVBleed: Covert and Side-Channel Attacks on NVIDIA Multi-GPU Interconnect Authors: Yicheng Zhang, Ravan Nazaraliyev, Sankha Baran Dutta, Andres Marquez, Kevin Barker, Nael Abu-Ghazaleh | Published: 2025-03-22 Cloud ComputingSide-Channel AttackAttack Method 2025.03.22 2025.05.27 Literature Database
Language Models May Verbatim Complete Text They Were Not Explicitly Trained On Authors: Ken Ziyu Liu, Christopher A. Choquette-Choo, Matthew Jagielski, Peter Kairouz, Sanmi Koyejo, Percy Liang, Nicolas Papernot | Published: 2025-03-21 | Updated: 2025-03-25 RAGMembership Disclosure RiskAdversarial attack 2025.03.21 2025.05.27 Literature Database
CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities Authors: Yuxuan Zhu, Antony Kellermann, Dylan Bowman, Philip Li, Akul Gupta, Adarsh Danda, Richard Fang, Conner Jensen, Eric Ihli, Jason Benn, Jet Geronimo, Avi Dhir, Sudhit Rao, Kaicheng Yu, Twm Stone, Daniel Kang | Published: 2025-03-21 Indirect Prompt InjectionCyber ThreatVulnerability Prediction 2025.03.21 2025.05.27 Literature Database
Bugdar: AI-Augmented Secure Code Review for GitHub Pull Requests Authors: John Naulty, Eason Chen, Joy Wang, George Digkas, Kostas Chalkias | Published: 2025-03-21 Poisoning attack on RAGSystem DevelopmentVulnerability Analysis 2025.03.21 2025.05.27 Literature Database
Towards LLM Guardrails via Sparse Representation Steering Authors: Zeqing He, Zhibo Wang, Huiyu Xu, Kui Ren | Published: 2025-03-21 Sparse Representation MethodModel InterpretabilityRole of Machine Learning 2025.03.21 2025.05.27 Literature Database
ATOM: A Framework of Detecting Query-Based Model Extraction Attacks for Graph Neural Networks Authors: Zhan Cheng, Bolin Shen, Tianming Sha, Yuan Gao, Shibo Li, Yushun Dong | Published: 2025-03-20 Graph Neural NetworkModel Performance EvaluationAnalysis of Detection Methods 2025.03.20 2025.05.27 Literature Database
Empirical Analysis of Privacy-Fairness-Accuracy Trade-offs in Federated Learning: A Step Towards Responsible AI Authors: Dawood Wasif, Dian Chen, Sindhuja Madabushi, Nithin Alluru, Terrence J. Moore, Jin-Hee Cho | Published: 2025-03-20 Privacy AnalysisFairness Trade-offDifferential Privacy 2025.03.20 2025.05.27 Literature Database
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models Authors: Zenghui Yuan, Jiawen Shi, Pan Zhou, Neil Zhenqiang Gong, Lichao Sun | Published: 2025-03-20 Backdoor AttackPrompt InjectionLarge Language Model 2025.03.20 2025.05.27 Literature Database
TVineSynth: A Truncated C-Vine Copula Generator of Synthetic Tabular Data to Balance Privacy and Utility Authors: Elisabeth Griesbauer, Claudia Czado, Arnoldo Frigessi, Ingrid Hobæk Haff | Published: 2025-03-20 Data GenerationPrivacy-Preserving Machine LearningMembership Inference 2025.03.20 2025.05.27 Literature Database