Literature Database

CLASP: Cost-Optimized LLM-based Agentic System for Phishing Detection

Authors: Fouad Trad, Ali Chehab | Published: 2025-10-21
Web Page Content Analysis
Prompt Injection
Malicious Website Detection

The Trust Paradox in LLM-Based Multi-Agent Systems: When Collaboration Becomes a Security Vulnerability

Authors: Zijie Xu, Minfeng Qi, Shiqing Wu, Lefeng Zhang, Qiwen Wei, Han He, Ningran Li | Published: 2025-10-21
Privacy Violation
Reliability Scoring
Information Leakage Analysis

Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization

Authors: Osama Al Haddad, Muhammad Ikram, Ejaz Ahmed, Young Lee | Published: 2025-10-21
Prompt Injection
Prompt leaking
脆弱性優先順位付け

One Size Fits All? A Modular Adaptive Sanitization Kit (MASK) for Customizable Privacy-Preserving Phone Scam Detection

Authors: Kangzhong Wang, Zitong Shen, Youqian Zhang, Michael MK Cheung, Xiapu Luo, Grace Ngai, Eugene Yujun Fu | Published: 2025-10-21
Privacy-Preserving Machine Learning
Prompt Injection
評価メトリクス

The Attribution Story of WhisperGate: An Academic Perspective

Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21
RAG
Network Threat Detection
Information Leakage Analysis

DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning

Authors: Yixuan Liu, Xinlei Li, Yi Li | Published: 2025-10-21
UI分析
Risk Assessment Method
Malicious Website Detection

Position: LLM Watermarking Should Align Stakeholders’ Incentives for Practical Adoption

Authors: Yepeng Liu, Xuandong Zhao, Dawn Song, Gregory W. Wornell, Yuheng Bu | Published: 2025-10-21
Incentive Mechanism
Digital Watermarking for Generative AI
Robustness of Watermarking Techniques

RESCUE: Retrieval Augmented Secure Code Generation

Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21
Poisoning attack on RAG
Data-Driven Vulnerability Assessment
Prompt leaking

PLAGUE: Plug-and-play framework for Lifelong Adaptive Generation of Multi-turn Exploits

Authors: Neeladri Bhuiya, Madhav Aggarwal, Diptanshu Purwar | Published: 2025-10-20 | Updated: 2025-10-22
Poisoning attack on RAG
攻撃者ターゲット更新
脱獄手法

VERA-V: Variational Inference Framework for Jailbreaking Vision-Language Models

Authors: Qilin Liao, Anamika Lochab, Ruqi Zhang | Published: 2025-10-20
Model DoS
Large Language Model
Untargeted Toxicity Attack