UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks Authors: Haolin Zheng, Ning Gao, Donghong Cai, Shi Jin, Michail Matthaiou | Published: 2025-08-18 UAV個体識別Performance EvaluationWatermark Evaluation 2025.08.18 2025.08.20 Literature Database
Can Large Language Models Improve Phishing Defense? A Large-Scale Controlled Experiment on Warning Dialogue Explanations Authors: Federico Maria Cau, Giuseppe Desolda, Francesco Greco, Lucio Davide Spano, Luca Viganò | Published: 2025-07-10 Indirect Prompt InjectionPerformance EvaluationPrompt Injection 2025.07.10 2025.07.12 Literature Database
Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models Authors: Jikesh Thapa, Gurrehmat Chahal, Serban Voinea Gabreanu, Yazan Otoum | Published: 2025-07-10 Performance EvaluationPrompt Injection次世代フィッシング検出 2025.07.10 2025.07.12 Literature Database
ZKTorch: Compiling ML Inference to Zero-Knowledge Proofs via Parallel Proof Accumulation Authors: Bing-Jyue Chen, Lilia Tang, Daniel Kang | Published: 2025-07-09 Performance EvaluationPolynomial ApproximationComputational Problem 2025.07.09 2025.07.11 Literature Database
PBa-LLM: Privacy- and Bias-aware NLP using Named-Entity Recognition (NER) Authors: Gonzalo Mancera, Aythami Morales, Julian Fierrez, Ruben Tolosana, Alejandro Penna, Miguel Lopez-Duran, Francisco Jurado, Alvaro Ortigosa | Published: 2025-06-30 | Updated: 2025-07-09 BiasPerformance EvaluationPrivacy Risk Management 2025.06.30 2025.07.11 Literature Database
Detecting Hard-Coded Credentials in Software Repositories via LLMs Authors: Chidera Biringa, Gokhan Kul | Published: 2025-06-16 Software SecurityPerformance EvaluationPrompt leaking 2025.06.16 2025.06.18 Literature Database
Chain-of-Code Collapse: Reasoning Failures in LLMs via Adversarial Prompting in Code Generation Authors: Jaechul Roh, Varun Gandhi, Shivani Anilkumar, Arin Garg | Published: 2025-06-08 | Updated: 2025-06-12 Performance EvaluationPrompt InjectionPrompt leaking 2025.06.08 2025.06.14 Literature Database
aiXamine: Simplified LLM Safety and Security Authors: Fatih Deniz, Dorde Popovic, Yazan Boshmaf, Euisuh Jeong, Minhaj Ahmad, Sanjay Chawla, Issa Khalil | Published: 2025-04-21 | Updated: 2025-04-23 LLM Performance EvaluationAlignmentPerformance Evaluation 2025.04.21 2025.05.27 Literature Database
How Effective Can Dropout Be in Multiple Instance Learning ? Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21 | Updated: 2025-05-20 Performance EvaluationMulti-Class ClassificationWatermarking Technology 2025.04.21 2025.05.27 Literature Database
Split-n-Chain: Privacy-Preserving Multi-Node Split Learning with Blockchain-Based Auditability Authors: Mukesh Sahani, Binanda Sengupta | Published: 2025-03-10 | Updated: 2025-04-15 Performance EvaluationPrivacy Protection MethodDistributed Learning 2025.03.10 2025.05.27 Literature Database