Injection, Attack and Erasure: Revocable Backdoor Attacks via Machine Unlearning Authors: Baogang Song, Dongdong Zhao, Jianwen Xiang, Qiben Xu, Zizhuo Yu | Published: 2025-10-15 Backdoor AttackModel Protection MethodsDefense Mechanism 2025.10.15 2025.10.17 Literature Database
PACEbench: A Framework for Evaluating Practical AI Cyber-Exploitation Capabilities Authors: Zicheng Liu, Lige Huang, Jie Zhang, Dongrui Liu, Yuan Tian, Jing Shao | Published: 2025-10-13 Security Analysis MethodLarge Language ModelDefense Mechanism 2025.10.13 2025.10.15 Literature Database
CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense Authors: Yang Zhuochen, Fok Kar Wai, Thing Vrizlynn | Published: 2025-10-13 Privacy Enhancing TechnologyImprovement of LearningDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Secret-Protected Evolution for Differentially Private Synthetic Text Generation Authors: Tianze Wang, Zhaoyu Chen, Jian Du, Yingtai Xiao, Linjun Zhang, Qiang Yan | Published: 2025-10-13 Data Protection MethodPrivacy Enhancing TechnologyDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Adversarial Robustness in One-Stage Learning-to-Defer Authors: Yannis Montreuil, Letian Yu, Axel Carlier, Lai Xing Ng, Wei Tsang Ooi | Published: 2025-10-13 RobustnessAdversarial LearningDefense Mechanism 2025.10.13 2025.10.15 Literature Database
A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems Authors: Hikmat A. M. Abdeljaber, Md. Alamgir Hossain, Sultan Ahmad, Ahmed Alsanad, Md Alimul Haque, Sudan Jha, Jabeen Nazeer | Published: 2025-10-09 IoT Security ChallengesDefense MechanismDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database
MetaDefense: Defending Finetuning-based Jailbreak Attack Before and During Generation Authors: Weisen Jiang, Sinno Jialin Pan | Published: 2025-10-09 Prompt InjectionRobustnessDefense Mechanism 2025.10.09 2025.10.11 Literature Database
Fine-Tuning Jailbreaks under Highly Constrained Black-Box Settings: A Three-Pronged Approach Authors: Xiangfang Li, Yu Wang, Bo Li | Published: 2025-10-01 | Updated: 2025-10-09 Indirect Prompt InjectionPrompt leakingDefense Mechanism 2025.10.01 2025.10.11 Literature Database
Defending MoE LLMs against Harmful Fine-Tuning via Safety Routing Alignment Authors: Jaehan Kim, Minkyoo Song, Seungwon Shin, Sooel Son | Published: 2025-09-26 | Updated: 2025-10-09 Bias Detection in AI OutputRobustnessDefense Mechanism 2025.09.26 2025.10.11 Literature Database
Adversarial Defense in Cybersecurity: A Systematic Review of GANs for Threat Detection and Mitigation Authors: Tharcisse Ndayipfukamiye, Jianguo Ding, Doreen Sebastian Sarwatt, Adamu Gaston Philipo, Huansheng Ning | Published: 2025-09-24 | Updated: 2025-09-30 Prompt InjectionCertified RobustnessDefense Mechanism 2025.09.24 2025.10.02 Literature Database