Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems Authors: Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh | Published: 2025-12-29 RAGModel DoS脆弱性優先順位付け 2025.12.29 2025.12.31 Literature Database
SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports Authors: Sogol Masoumzadeh, Yufei Li, Shane McIntosh, Dániel Varró, Lili Wei | Published: 2025-12-17 Model DoSPerformance EvaluationDeep Learning Technology 2025.12.17 2025.12.19 Literature Database
TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection Authors: Jian-Yu Jiang-Lin, Kang-Yang Huang, Ling Zou, Ling Lo, Sheng-Ping Yang, Yu-Wen Tseng, Kun-Hsiang Lin, Chia-Ling Chen, Yu-Ting Ta, Yan-Tsung Wang, Po-Ching Chen, Hongxia Xie, Hong-Han Shuai, Wen-Huang Cheng | Published: 2025-12-11 Detection of HallucinationsModel DoSEvaluation Method 2025.12.11 2025.12.13 Literature Database
Amulet: Fast TEE-Shielded Inference for On-Device Model Protection Authors: Zikai Mao, Lingchen Zhao, Lei Xu, Wentao Dong, Shenyi Zhang, Cong Wang, Qian Wang | Published: 2025-12-08 CybersecurityPrivacy AnalysisModel DoS 2025.12.08 2025.12.10 Literature Database
ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking Authors: Yunzhe Li, Jianan Wang, Hongzi Zhu, James Lin, Shan Chang, Minyi Guo | Published: 2025-12-08 DoS MitigationPrompt InjectionModel DoS 2025.12.08 2025.12.10 Literature Database
A Light-Weight Large Language Model File Format for Highly-Secure Model Distribution Authors: Huifeng Zhu, Shijie Li, Qinfeng Li, Yier Jin | Published: 2025-12-04 Model DoSDetection of Model Extraction AttacksInformation Security 2025.12.04 2025.12.06 Literature Database
HarnessAgent: Scaling Automatic Fuzzing Harness Construction with Tool-Augmented LLM Pipelines Authors: Kang Yang, Yunhang Zhang, Zichuan Li, GuanHong Tao, Jun Xu, XiaoJing Liao | Published: 2025-12-03 Prompt InjectionModel DoS自動化ペネトレーションテスト 2025.12.03 2025.12.05 Literature Database
Contextual Image Attack: How Visual Context Exposes Multimodal Safety Vulnerabilities Authors: Yuan Xiong, Ziqi Miao, Lijun Li, Chen Qian, Jie Li, Jing Shao | Published: 2025-12-02 Prompt InjectionModel DoSImage Generation Technology 2025.12.02 2025.12.04 Literature Database
DefenSee: Dissecting Threat from Sight and Text – A Multi-View Defensive Pipeline for Multi-modal Jailbreaks Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-12-01 Prompt InjectionModel DoSRobustness Improvement Method 2025.12.01 2025.12.03 Literature Database
TZ-LLM: Protecting On-Device Large Language Models with Arm TrustZone Authors: Xunjie Wang, Jiacheng Shi, Zihan Zhao, Yang Yu, Zhichao Hua, Jinyu Gu | Published: 2025-11-17 Prompt leakingModel DoSPerformance Evaluation Metrics 2025.11.17 2025.11.19 Literature Database