EditMF: Drawing an Invisible Fingerprint for Your Large Language Models Authors: Jiaxuan Wu, Yinghan Zhou, Wanli Peng, Yiming Xue, Juan Wen, Ping Zhong | Published: 2025-08-12 Large Language ModelAuthor Attribution MethodWatermark Design 2025.08.12 2025.08.14 Literature Database
Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection Authors: Aydin Zaboli, Junho Hong | Published: 2025-08-12 Perturbation Method for Categorical VariablesFrameworkPerformance Evaluation Method 2025.08.12 2025.08.14 Literature Database
Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-08-11 FrameworkPrompt InjectionPerformance Evaluation Method 2025.08.11 2025.08.13 Literature Database
Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation Authors: Jiongchi Yu, Xiaofei Xie, Qiang Hu, Yuhan Ma, Ziming Zhao | Published: 2025-08-11 Indirect Prompt InjectionData CollectionUser Behavior Analysis 2025.08.11 2025.08.13 Literature Database
Uncertainty-Driven Reliability: Selective Prediction and Trustworthy Deployment in Modern Machine Learning Authors: Stephan Rabanser | Published: 2025-08-11 Data CurationDifferential Privacy 2025.08.11 2025.08.13 Literature Database
ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts Authors: Pasquale De Rosa, Pascal Felber, Valerio Schiavoni | Published: 2025-08-09 | Updated: 2025-08-12 FrameworkProactive Defense 2025.08.09 2025.08.14 Literature Database
Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification Authors: Thorsten Peinemann, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Esfandiar Mohammadi | Published: 2025-08-07 Backdoor AttackBackdoor Attack TechniquesPoisoning 2025.08.07 2025.08.09 Literature Database
Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs) Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07 IoTネットワーク攻撃Performance Evaluation MethodWatermark Design 2025.08.07 2025.08.09 Literature Database
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07 RAGPerformance Evaluation MethodDeep Learning 2025.08.07 2025.08.09 Literature Database
Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07 Poisoning attack on RAGReinforcement LearningPerformance Evaluation Method 2025.08.07 2025.08.09 Literature Database