Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21 Smart Contract AuditVulnerability ResearchWatermarking Technology 2025.04.21 2025.05.27 Literature Database
GraphAttack: Exploiting Representational Blindspots in LLM Safety Mechanisms Authors: Sinan He, An Wang | Published: 2025-04-17 AlignmentPrompt InjectionVulnerability Research 2025.04.17 2025.05.27 Literature Database