PiMRef: Detecting and Explaining Ever-evolving Spear Phishing Emails with Knowledge Base Invariants Authors: Ruofan Liu, Yun Lin, Silas Yeo Shuen Yu, Xiwen Teoh, Zhenkai Liang, Jin Song Dong | Published: 2025-07-21 Social Engineering AttackBusiness Email CompromiseFeature Extraction 2025.07.21 2025.07.23 Literature Database
Personalized Attacks of Social Engineering in Multi-turn Conversations — LLM Agents for Simulation and Detection Authors: Tharindu Kumarage, Cameron Johnson, Jadie Adams, Lin Ai, Matthias Kirchner, Anthony Hoogs, Joshua Garland, Julia Hirschberg, Arslan Basharat, Huan Liu | Published: 2025-03-18 AlignmentSocial Engineering AttackAttack Method 2025.03.18 2025.05.27 Literature Database
Defending Against Social Engineering Attacks in the Age of LLMs Authors: Lin Ai, Tharindu Kumarage, Amrita Bhattacharjee, Zizhou Liu, Zheng Hui, Michael Davinroy, James Cook, Laura Cassani, Kirill Trapeznikov, Matthias Kirchner, Arslan Basharat, Anthony Hoogs, Joshua Garland, Huan Liu, Julia Hirschberg | Published: 2024-06-18 | Updated: 2024-10-11 Indirect Prompt InjectionCyber ThreatSocial Engineering Attack 2024.06.18 2025.05.27 Literature Database