Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems Authors: Mohamed ElShehaby, Ashraf Matrawy | Published: 2025-10-22 Network Threat DetectionModel RobustnessCertified Robustness 2025.10.22 2025.10.24 Literature Database
CircuitGuard: Mitigating LLM Memorization in RTL Code Generation Against IP Leakage Authors: Nowfel Mashnoor, Mohammad Akyash, Hadi Kamali, Kimia Azar | Published: 2025-10-22 Privacy-Preserving Machine LearningPrompt leakingCauses of Information Leakage 2025.10.22 2025.10.24 Literature Database
Can You Trust What You See? Alpha Channel No-Box Attacks on Video Object Detection Authors: Ariana Yi, Ce Zhou, Liyang Xiao, Qiben Yan | Published: 2025-10-22 Platform ArchitectureModel RobustnessResearch Methodology 2025.10.22 2025.10.24 Literature Database
Monitoring LLM-based Multi-Agent Systems Against Corruptions via Node Evaluation Authors: Chengcan Wu, Zhixin Zhang, Mingqian Xu, Zeming Wei, Meng Sun | Published: 2025-10-22 Indirect Prompt Injectionエージェント設計Network Threat Detection 2025.10.22 2025.10.24 Literature Database
Defending Against Prompt Injection with DataFilter Authors: Yizhu Wang, Sizhe Chen, Raghad Alkhudair, Basel Alomair, David Wagner | Published: 2025-10-22 Indirect Prompt InjectionPrompt Injectionプロンプトインジェクション攻撃 2025.10.22 2025.10.24 Literature Database
OpenGuardrails: An Open-Source Context-Aware AI Guardrails Platform Authors: Thomas Wang, Haowen Li | Published: 2025-10-22 Platform Architecture動的ポリシー適応Author Contribution 2025.10.22 2025.10.24 Literature Database
HarmNet: A Framework for Adaptive Multi-Turn Jailbreak Attacks on Large Language Models Authors: Sidhant Narula, Javad Rafiei Asl, Mohammad Ghasemigol, Eduardo Blanco, Daniel Takabi | Published: 2025-10-21 Query Generation MethodLarge Language Model脱獄手法 2025.10.21 2025.10.23 Literature Database
Exploring Membership Inference Vulnerabilities in Clinical Large Language Models Authors: Alexander Nemecek, Zebin Yun, Zahra Rahmani, Yaniv Harel, Vipin Chaudhary, Mahmood Sharif, Erman Ayday | Published: 2025-10-21 Privacy-Preserving Machine LearningPrompt leakingThreats of Medical AI 2025.10.21 2025.10.23 Literature Database
DRsam: Detection of Fault-Based Microarchitectural Side-Channel Attacks in RISC-V Using Statistical Preprocessing and Association Rule Mining Authors: Muhammad Hassan, Maria Mushtaq, Jaan Raik, Tara Ghasempouri | Published: 2025-10-21 Program AnalysisFeature ExtractionAnomaly Detection Method 2025.10.21 2025.10.23 Literature Database
Evaluating Large Language Models in detecting Secrets in Android Apps Authors: Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-10-21 Program AnalysisPrompt InjectionInformation Leakage Analysis 2025.10.21 2025.10.23 Literature Database