Regression-aware Continual Learning for Android Malware Detection Authors: Daniele Ghiani, Daniele Angioni, Giorgio Piras, Angelo Sotgiu, Luca Minnei, Srishti Gupta, Maura Pintor, Fabio Roli, Battista Biggio | Published: 2025-07-24 Security Strategy GenerationSoftware SecurityDrift Detection Method 2025.07.24 2025.07.26 Literature Database
RECALLED: An Unbounded Resource Consumption Attack on Large Vision-Language Models Authors: Haoran Gao, Yuanhe Zhang, Zhenhong Zhou, Lei Jiang, Fanyu Meng, Yujia Xiao, Kun Wang, Yang Liu, Junlan Feng | Published: 2025-07-24 Security Strategy Generation攻撃戦略分析Visual Techniques 2025.07.24 2025.07.26 Literature Database
Enabling Cyber Security Education through Digital Twins and Generative AI Authors: Vita Santa Barletta, Vito Bavaro, Miriana Calvano, Antonio Curci, Antonio Piccinno, Davide Pio Posa | Published: 2025-07-23 Security Strategy Generation攻撃戦略分析Educational Approach 2025.07.23 2025.07.25 Literature Database
MAD-Spear: A Conformity-Driven Prompt Injection Attack on Multi-Agent Debate Systems Authors: Yu Cui, Hongyang Du | Published: 2025-07-17 Security Strategy GenerationPrompt leakingAttacker Behavior Analysis 2025.07.17 2025.07.19 Literature Database
An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks Authors: Qi Qin, Xinye Cao, Guoshun Nan, Sihan Chen, Rushan Li, Li Su, Haitao Du, Qimei Cui, Pengxuan Mao, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-05-06 | Updated: 2025-05-07 Poisoning attack on RAGSecurity Strategy GenerationSelf-Evolving Framework 2025.05.06 2025.05.27 Literature Database