RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models Authors: Fanchao Meng, Jiaping Gui, Yunbo Li, Yue Wu | Published: 2025-10-16 Network Traffic AnalysisBackdoor DetectionEvaluation Method 2025.10.16 2025.10.18 Literature Database
Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored Mixture-of-Experts Transformers Authors: Xin Zhao, Xiaojun Chen, Bingshan Liu, Haoyu Gao, Zhendong Zhao, Yilong Chen | Published: 2025-10-15 Backdoor DetectionPrompt leakingLarge Language Model 2025.10.15 2025.10.17 Literature Database
DeepTrust: Multi-Step Classification through Dissimilar Adversarial Representations for Robust Android Malware Detection Authors: Daniel Pulido-Cortázar, Daniel Gibert, Felip Manyà | Published: 2025-10-14 Backdoor DetectionCertified RobustnessRobustness 2025.10.14 2025.10.16 Literature Database
New Machine Learning Approaches for Intrusion Detection in ADS-B Authors: Mikaëla Ngamboé, Jean-Simon Marrocco, Jean-Yves Ouattara, José M. Fernandez, Gabriela Nicolescu | Published: 2025-10-09 Backdoor DetectionPerformance Evaluation Metrics通信セキュリティ 2025.10.09 2025.10.11 Literature Database
A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs Authors: Kiho Lee, Jungkon Kim, Doowon Kim, Hyoungshick Kim | Published: 2025-09-16 コード生成手法Backdoor Detection脆弱性検出手法 2025.09.16 2025.09.18 Literature Database
ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models Authors: Zihan Wang, Rui Zhang, Hongwei Li, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Guowen Xu | Published: 2025-08-02 | Updated: 2025-08-05 Backdoor DetectionBackdoor Attack TechniquesModel DoS 2025.08.02 2025.08.07 Literature Database
Empirical Evaluation of Concept Drift in ML-Based Android Malware Detection Authors: Ahmed Sabbah, Radi Jarrar, Samer Zein, David Mohaisen | Published: 2025-07-30 Drift Detection MethodBackdoor DetectionRobustness of Watermarking Techniques 2025.07.30 2025.08.01 Literature Database
The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09 Poisoning attack on RAGIndirect Prompt InjectionBackdoor Detection 2025.07.09 2025.07.11 Literature Database
RawMal-TF: Raw Malware Dataset Labeled by Type and Family Authors: David Bálik, Martin Jureček, Mark Stamp | Published: 2025-06-30 Backdoor DetectionPrompt InjectionDataset for Malware Classification 2025.06.30 2025.07.02 Literature Database
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty Authors: Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, Yue Zhao | Published: 2025-06-24 Backdoor DetectionPrivacy ProtectionPrivacy protection framework 2025.06.24 2025.06.26 Literature Database