APFuzz: Towards Automatic Greybox Protocol Fuzzing Authors: Yu Wang, Yang Xiang, Chandra Thapa, Hajime Suzuki | Published: 2026-02-25 プロトコルファジングPrompt InjectionResearch Methodology 2026.02.25 2026.02.27 Literature Database
Dirichlet Scale Mixture Priors for Bayesian Neural Networks Authors: August Arnstad, Leiv Rønneberg, Geir Storvik | Published: 2026-02-23 Model IdentificationResearch MethodologyHigh-Dimensional Data Analysis 2026.02.23 2026.02.25 Literature Database
Can You Trust What You See? Alpha Channel No-Box Attacks on Video Object Detection Authors: Ariana Yi, Ce Zhou, Liyang Xiao, Qiben Yan | Published: 2025-10-22 Platform ArchitectureModel RobustnessResearch Methodology 2025.10.22 2025.10.24 Literature Database
Send to which account? Evaluation of an LLM-based Scambaiting System Authors: Hossein Siadati, Haadi Jafarian, Sima Jafarikhah | Published: 2025-09-10 Disabling Safety Mechanisms of LLMResearch Methodology詐欺対策 2025.09.10 2025.09.12 Literature Database
A Transformer-Based Approach for DDoS Attack Detection in IoT Networks Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14 Data CollectionPerformance EvaluationResearch Methodology 2025.08.14 2025.08.16 Literature Database
Gaze3P: Gaze-Based Prediction of User-Perceived Privacy Authors: Mayar Elfares, Pascal Reisert, Ralf Küsters, Andreas Bulling | Published: 2025-07-01 | Updated: 2025-09-10 Privacy TechniquePrivacy AssessmentResearch Methodology 2025.07.01 2025.09.12 Literature Database
PRISON: Unmasking the Criminal Potential of Large Language Models Authors: Xinyi Wu, Geng Hong, Pei Chen, Yueyue Chen, Xudong Pan, Min Yang | Published: 2025-06-19 | Updated: 2025-08-04 Disabling Safety Mechanisms of LLM法執行回避Research Methodology 2025.06.19 2025.08.06 Literature Database
LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy Authors: Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy | Published: 2025-05-24 | Updated: 2025-06-23 LLMとAPTの関係Information SecurityResearch Methodology 2025.05.24 2025.06.25 Literature Database
Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 Network Threat DetectionResearch MethodologyWatermark 2025.04.23 2025.05.27 Literature Database
On Benchmarking Code LLMs for Android Malware Analysis Authors: Yiling He, Hongyu She, Xingzhi Qian, Xinran Zheng, Zhuo Chen, Zhan Qin, Lorenzo Cavallaro | Published: 2025-04-01 | Updated: 2025-04-23 LLM Performance EvaluationMalware Detection MethodResearch Methodology 2025.04.01 2025.05.27 Literature Database