Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks Authors: Yaokai Feng, Kouichi Sakurai | Published: 2025-10-27 LLMsによる攻撃手法Cyber Threat IntelligencePrompt Injection 2025.10.27 2025.10.29 Literature Database
Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies Authors: Bin Wang, YiLu Zhong, MiDi Wan, WenJie Yu, YuanBing Ouyang, Yenan Huang, Hui Li | Published: 2025-10-27 Software SecurityPrompt InjectionPrompt leaking 2025.10.27 2025.10.29 Literature Database
SAID: Empowering Large Language Models with Self-Activating Internal Defense Authors: Yulong Chen, Yadong Liu, Jiawen Zhang, Mu Li, Chao Huang, Jie Wen | Published: 2025-10-23 Prompt InjectionModel RobustnessLarge Language Model 2025.10.23 2025.10.25 Literature Database
Defending Against Prompt Injection with DataFilter Authors: Yizhu Wang, Sizhe Chen, Raghad Alkhudair, Basel Alomair, David Wagner | Published: 2025-10-22 Indirect Prompt InjectionPrompt Injectionプロンプトインジェクション攻撃 2025.10.22 2025.10.24 Literature Database
Evaluating Large Language Models in detecting Secrets in Android Apps Authors: Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-10-21 Program AnalysisPrompt InjectionInformation Leakage Analysis 2025.10.21 2025.10.23 Literature Database
CLASP: Cost-Optimized LLM-based Agentic System for Phishing Detection Authors: Fouad Trad, Ali Chehab | Published: 2025-10-21 Web Page Content AnalysisPrompt InjectionMalicious Website Detection 2025.10.21 2025.10.23 Literature Database
Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization Authors: Osama Al Haddad, Muhammad Ikram, Ejaz Ahmed, Young Lee | Published: 2025-10-21 Prompt InjectionPrompt leaking脆弱性優先順位付け 2025.10.21 2025.10.23 Literature Database
One Size Fits All? A Modular Adaptive Sanitization Kit (MASK) for Customizable Privacy-Preserving Phone Scam Detection Authors: Kangzhong Wang, Zitong Shen, Youqian Zhang, Michael MK Cheung, Xiapu Luo, Grace Ngai, Eugene Yujun Fu | Published: 2025-10-21 Privacy-Preserving Machine LearningPrompt Injection評価メトリクス 2025.10.21 2025.10.23 Literature Database
CrossGuard: Safeguarding MLLMs against Joint-Modal Implicit Malicious Attacks Authors: Xu Zhang, Hao Li, Zhichao Lu | Published: 2025-10-20 Query Generation MethodPrompt InjectionLarge Language Model 2025.10.20 2025.10.22 Literature Database
Multimodal Safety Is Asymmetric: Cross-Modal Exploits Unlock Black-Box MLLMs Jailbreaks Authors: Xinkai Wang, Beibei Li, Zerui Shao, Ao Liu, Shouling Ji | Published: 2025-10-20 Disabling Safety Mechanisms of LLMPrompt InjectionMalicious Content Generation 2025.10.20 2025.10.22 Literature Database