Literature Database

VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs

Authors: Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye | Published: 2025-08-05
Prompt Injection
Prompt leaking
Watermark

Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems

Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04
RAG
Traffic Simulation
Watermark

SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning

Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04
Blockchain Strategy
Vulnerability Analysis
Watermark

A Survey on Data Security in Large Language Models

Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04
Indirect Prompt Injection
Prompt leaking
Watermark

FPEdit: Robust LLM Fingerprinting through Localized Knowledge Editing

Authors: Shida Wang, Chaohu Liu, Yubo Wang, Linli Xu | Published: 2025-08-04
Deepfake
Digital Watermarking for Generative AI
Watermark

PhishParrot: LLM-Driven Adaptive Crawling to Unveil Cloaked Phishing Sites

Authors: Hiroki Nakano, Takashi Koide, Daiki Chiba | Published: 2025-08-04
Indirect Prompt Injection
Prompt Injection
Malicious Website Detection

ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models

Authors: Zihan Wang, Rui Zhang, Hongwei Li, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Guowen Xu | Published: 2025-08-02 | Updated: 2025-08-05
Backdoor Detection
Backdoor Attack Techniques
Model DoS

BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability

Authors: Zhenhua Zou, Zhuotao Liu, Lepeng Zhao, Qiuyang Zhan | Published: 2025-08-02 | Updated: 2025-08-05
DID文書構築
Trust Evaluation
Watermark

LLM-Based Identification of Infostealer Infection Vectors from Screenshots: The Case of Aurora

Authors: Estelle Ruellan, Eric Clay, Nicholas Ascoli | Published: 2025-07-31
Indirect Prompt Injection
User Behavior Analysis
Malicious Website Detection

Medical Image De-Identification Benchmark Challenge

Authors: Linmin Pei, Granger Sutton, Michael Rutherford, Ulrike Wagner, Tracy Nolan, Kirk Smith, Phillip Farmer, Peter Gu, Ambar Rana, Kailing Chen, Thomas Ferleman, Brian Park, Ye Wu, Jordan Kojouharov, Gargi Singh, Jon Lemon, Tyler Willis, Milos Vukadinovic, Grant Duffy, Bryan He, David Ouyang, Marco Pereanez, Daniel Samber, Derek A. Smith, Christopher Cannistraci, Zahi Fayad, David S. Mendelson, Michele Bufano, Elmar Kotter, Hamideh Haghiri, Rajesh Baidya, Stefan Dvoretskii, Klaus H. Maier-Hein, Marco Nolden, Christopher Ablett, Silvia Siggillino, Sandeep Kaushik, Hongzhu Jiang, Sihan Xie, Zhiyu Wan, Alex Michie, Simon J Doran, Angeline Aurelia Waly, Felix A. Nathaniel Liang, Humam Arshad Mustagfirin, Michelle Grace Felicia, Kuo Po Chih, Rahul Krish, Ghulam Rasool, Nidhal Bouaynaya, Nikolas Koutsoubis, Kyle Naddeo, Kartik Pandit, Tony O'Sullivan, Raj Krish, Qinyan Pan, Scott Gustafson, Benjamin Kopchick, Laura Opsahl-Ong, Andrea Olvera-Morales, Jonathan Pinney, Kathryn Johnson, Theresa Do, Juergen Klenk, Maria Diaz, Arti Singh, Rong Chai, David A. Clunie, Fred Prior, Keyvan Farahani | Published: 2025-07-31
Data-Driven Vulnerability Assessment
測定手法の選択
Watermark Robustness