Literature Database

MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies

Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18
Algorithm Design
Prompt Injection
Attack Type

SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip

Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
Hardware Security
Knowledge Graph Inference
Vulnerability Management

Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds

Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18
Algorithm Design
Privacy Design Principles
Watermark Design

Consiglieres in the Shadow: Understanding the Use of Uncensored Large Language Models in Cybercrimes

Authors: Zilong Lin, Zichuan Li, Xiaojing Liao, XiaoFeng Wang | Published: 2025-08-18
Disabling Safety Mechanisms of LLM
Data Generation Method
Calculation of Output Harmfulness

UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks

Authors: Haolin Zheng, Ning Gao, Donghong Cai, Shi Jin, Michail Matthaiou | Published: 2025-08-18
UAV個体識別
Performance Evaluation
Watermark Evaluation

Systematic Analysis of MCP Security

Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18
Prompt Injection
Attack Chain Analysis
Vulnerability Assessment Method

SoK: Data Minimization in Machine Learning

Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14
RAG
Privacy Assessment
Differential Privacy

Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence

Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14
LLM活用
RAG
Framework

A Transformer-Based Approach for DDoS Attack Detection in IoT Networks

Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14
Data Collection
Performance Evaluation
Research Methodology

Jailbreaking Commercial Black-Box LLMs with Explicitly Harmful Prompts

Authors: Chiyu Zhang, Lu Zhou, Xiaogang Xu, Jiafei Wu, Liming Fang, Zhe Liu | Published: 2025-08-14
Social Engineering Attack
Prompt Injection
Large Language Model