Literature Database

Defining Cost Function of Steganography with Large Language Models

Authors: Hanzhou Wu, Yige Wang | Published: 2025-12-10
画像処理手法
evaluation metrics
Evolutionary Score Calculation

Chasing Shadows: Pitfalls in LLM Security Research

Authors: Jonathan Evertz, Niklas Risse, Nicolai Neuer, Andreas Müller, Philipp Normann, Gaetano Sapia, Srishti Gupta, David Pape, Soumya Shaw, Devansh Srivastav, Christian Wressnegger, Erwin Quiring, Thorsten Eisenhofer, Daniel Arp, Lea Schönherr | Published: 2025-12-10
Prompt Injection
Prompt leaking

Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks

Authors: Xinye Cao, Yihan Lin, Guoshun Nan, Qinchuan Zhou, Yuhang Luo, Yurui Gao, Zeliang Zhang, Haolang Lu, Qimei Cui, Yanzhao Hou, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-12-10
SecLoopの自動化された応答機能
Cybersecurity
Reinforcement Learning

BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks

Authors: Uisang Lee, Changhoon Chung, Junmo Lee, Soo-Mook Moon | Published: 2025-12-10
Cybersecurity
Blockchain

Impact of Positional Encoding: Clean and Adversarial Rademacher Complexity for Transformers under In-Context Regression

Authors: Weiyi He, Yue Xing | Published: 2025-12-10
エラー解析
Robustness Analysis
一般化境界

Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety

Authors: Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong | Published: 2025-12-09
Privacy Assurance
Privacy Analysis
Federated Learning

PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration

Authors: Yi Liu, Weixiang Han, Chengjun Cai, Xingliang Yuan, Cong Wang | Published: 2025-12-09
Backdoor Detection
Privacy Assurance
Privacy Analysis

Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework

Authors: Sadegh Momeni, Ge Zhang, Birkett Huber, Hamza Harkous, Sam Lipton, Benoit Seguin, Yanis Pavlidis | Published: 2025-12-09
Cybersecurity
Safety of Data Generation
Prompt Injection

Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs

Authors: Yinan Zhong, Qianhao Miao, Yanjiao Chen, Jiangyi Deng, Yushi Cheng, Wenyuan Xu | Published: 2025-12-09
Indirect Prompt Injection
Prompt validation
Large Language Model

Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships

Authors: Bin Wang, Hui Li, Liyang Zhang, Qijia Zhuang, Ao Yang, Dong Zhang, Xijun Luo, Bing Lin | Published: 2025-12-09
Privacy Leakage
偽陽性分析
Information Security