Thought Purity: Defense Paradigm For Chain-of-Thought Attack Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16 Information SecurityThreat modelingDefense Method 2025.07.16 2025.07.18 Literature Database
ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis Authors: Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu | Published: 2025-06-18 | Updated: 2025-07-08 Event IdentificationInformation SecurityVulnerability Attack Method 2025.06.18 2025.07.10 Literature Database
Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World Authors: Huma Habib Shadan, Sardar Islam | Published: 2025-06-12 | Updated: 2025-07-08 Risk ManagementInformation Security量子コンピューティング 2025.06.12 2025.07.10 Literature Database
LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy Authors: Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy | Published: 2025-05-24 | Updated: 2025-06-23 LLMとAPTの関係Information SecurityResearch Methodology 2025.05.24 2025.06.25 Literature Database
Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07 Prompt leakingInformation SecurityAdversarial Example 2025.04.07 2025.05.27 Literature Database
No Free Lunch with Guardrails Authors: Divyanshu Kumar, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2025-04-01 | Updated: 2025-04-03 Prompt InjectionModel DoSInformation Security 2025.04.01 2025.05.27 Literature Database
Models That Are Interpretable But Not Transparent Authors: Chudi Zhong, Panyu Chen, Cynthia Rudin | Published: 2025-02-26 Method for Providing Explainability while Keeping Model Information ConfidentialInformation SecurityAttacker Behavior Analysis 2025.02.26 2025.05.27 Literature Database
Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07 LLM ApplicationRisk Analysis MethodInformation Security 2025.02.10 2025.05.27 Literature Database
Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15 Prompt leakingModel DoSInformation Security 2024.12.30 2025.05.27 Literature Database
A Chatbot for Information Security Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01 Abuse of AI ChatbotsAdvice ProvisionInformation Security 2020.12.01 2025.05.28 Literature Database