JavaSith: A Client-Side Framework for Analyzing Potentially Malicious Extensions in Browsers, VS Code, and NPM Packages Authors: Avihay Cohen | Published: 2025-05-27 API SecurityClient-Side DefensePrompt Injection 2025.05.27 2025.05.29 Literature Database
Red-Teaming Text-to-Image Systems by Rule-based Preference Modeling Authors: Yichuan Cao, Yibo Miao, Xiao-Shan Gao, Yinpeng Dong | Published: 2025-05-27 Model EvaluationExperimental ValidationAttack Evaluation 2025.05.27 2025.05.29 Literature Database
SHE-LoRA: Selective Homomorphic Encryption for Federated Tuning with Heterogeneous LoRA Authors: Jianmin Liu, Li Yan, Borui Li, Lei Yu, Chao Shen | Published: 2025-05-27 Client-Side DefensePrivacy ClassificationEncryption Method 2025.05.27 2025.05.29 Literature Database
IRCopilot: Automated Incident Response with Large Language Models Authors: Xihuan Lin, Jie Zhang, Gelei Deng, Tianzhe Liu, Xiaolong Liu, Changcai Yang, Tianwei Zhang, Qing Guo, Riqing Chen | Published: 2025-05-27 LLM SecurityIndirect Prompt InjectionModel DoS 2025.05.27 2025.05.29 Literature Database
Respond to Change with Constancy: Instruction-tuning with LLM for Non-I.I.D. Network Traffic Classification Authors: Xinjie Lin, Gang Xiong, Gaopeng Gou, Wenqi Dong, Jing Yu, Zhen Li, Wei Xia | Published: 2025-05-27 トラフィック分類Model Performance EvaluationStructural Learning 2025.05.27 2025.05.29 Literature Database
Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge Proofs Authors: Filippo Scaramuzza, Giovanni Quattrocchi, Damian A. Tamburri | Published: 2025-05-26 Privacy IssuesModel evaluation methodsWatermarking Technology 2025.05.26 2025.05.28 Literature Database
TrojanStego: Your Language Model Can Secretly Be A Steganographic Privacy Leaking Agent Authors: Dominik Meier, Jan Philip Wahle, Paul Röttger, Terry Ruas, Bela Gipp | Published: 2025-05-26 Prompt InjectionModel Extraction AttackWatermarking Technology 2025.05.26 2025.05.28 Literature Database
DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response Authors: Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi | Published: 2025-05-26 HallucinationModel Performance EvaluationEvaluation Method 2025.05.26 2025.05.28 Literature Database
Differential Privacy Analysis of Decentralized Gossip Averaging under Varying Threat Models Authors: Antti Koskela, Tejas Kulkarni | Published: 2025-05-26 Privacy IssuesDifferential PrivacyWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Deconstructing Obfuscation: A four-dimensional framework for evaluating Large Language Models assembly code deobfuscation capabilities Authors: Anton Tkachenko, Dmitrij Suskevic, Benjamin Adolphi | Published: 2025-05-26 Model evaluation methodsLarge Language ModelWatermarking Technology 2025.05.26 2025.05.28 Literature Database