Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27 Software SecurityPerformance Evaluation MethodVulnerability detection 2025.10.27 2025.10.29 Literature Database
Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection Authors: Aydin Zaboli, Junho Hong | Published: 2025-08-12 Perturbation Method for Categorical VariablesFrameworkPerformance Evaluation Method 2025.08.12 2025.08.14 Literature Database
Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-08-11 FrameworkPrompt InjectionPerformance Evaluation Method 2025.08.11 2025.08.13 Literature Database
Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs) Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07 IoTネットワーク攻撃Performance Evaluation MethodWatermark Design 2025.08.07 2025.08.09 Literature Database
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07 RAGPerformance Evaluation MethodDeep Learning 2025.08.07 2025.08.09 Literature Database
Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07 Poisoning attack on RAGReinforcement LearningPerformance Evaluation Method 2025.08.07 2025.08.09 Literature Database
Matrix-Free Two-to-Infinity and One-to-Two Norms Estimation Authors: Askar Tsyganov, Evgeny Frolov, Sergey Samsonov, Maxim Rakhuba | Published: 2025-08-06 Robust OptimizationPerformance Evaluation MethodDeep Learning 2025.08.06 2025.08.08 Literature Database
A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17 IoT Data Analysis TaskPerformance Evaluation MethodFeature Extraction 2025.07.17 2025.07.19 Literature Database
Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017 Authors: Zhaoyang Xu, Yunbo Liu | Published: 2025-06-23 | Updated: 2025-08-11 Certified RobustnessPerformance Evaluation MethodAnomaly Detection Method 2025.06.23 2025.08.13 Literature Database
Sharpening Kubernetes Audit Logs with Context Awareness Authors: Matteo Franzil, Valentino Armani, Luis Augusto Dias Knob, Domenico Siracusa | Published: 2025-06-19 | Updated: 2025-10-27 Challenges of Log AnalysisPerformance Evaluation Method監査手法 2025.06.19 2025.10.29 Literature Database