IntentMiner: Intent Inversion Attack via Tool Call Analysis in the Model Context Protocol Authors: Yunhao Yao, Zhiqiang Wang, Haoran Cheng, Yihang Cheng, Haohua Du, Xiang-Yang Li | Published: 2025-12-16 LLM活用Privacy Enhancing ProtocolFramework 2025.12.16 2025.12.18 Literature Database
Human-AI Collaborative Bot Detection in MMORPGs Authors: Jaeman Son, Hyunsoo Kim | Published: 2025-08-28 Indirect Prompt InjectionFrameworkEducation and Follow-up 2025.08.28 2025.09.01 Literature Database
Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14 LLM活用RAGFramework 2025.08.14 2025.08.16 Literature Database
Extending the OWASP Multi-Agentic System Threat Modeling Guide: Insights from Multi-Agent Security Research Authors: Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-08-13 FrameworkマルチエージェントシステムConsensus Formation Algorithm 2025.08.13 2025.08.15 Literature Database
Causal Graph Profiling via Structural Divergence for Robust Anomaly Detection in Cyber-Physical Systems Authors: Arun Vignesh Malarkkan, Haoyue Bai, Dongjie Wang, Yanjie Fu | Published: 2025-08-13 Sensor Array DesignFrameworkDynamic Graph Processing 2025.08.13 2025.08.15 Literature Database
Oblivionis: A Lightweight Learning and Unlearning Framework for Federated Large Language Models Authors: Fuyao Zhang, Xinyu Yan, Tiantong Wu, Wenjie Li, Tianxiang Chen, Yang Cao, Ran Yan, Longtao Huang, Wei Yang Bryan Lim, Qiang Yang | Published: 2025-08-12 Data Management SystemFrameworkPrompt Injection 2025.08.12 2025.08.14 Literature Database
Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection Authors: Aydin Zaboli, Junho Hong | Published: 2025-08-12 Perturbation Method for Categorical VariablesFrameworkPerformance Evaluation Method 2025.08.12 2025.08.14 Literature Database
Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-08-11 FrameworkPrompt InjectionPerformance Evaluation Method 2025.08.11 2025.08.13 Literature Database
ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts Authors: Pasquale De Rosa, Pascal Felber, Valerio Schiavoni | Published: 2025-08-09 | Updated: 2025-08-12 FrameworkProactive Defense 2025.08.09 2025.08.14 Literature Database
MetaCipher: A Time-Persistent and Universal Multi-Agent Framework for Cipher-Based Jailbreak Attacks for LLMs Authors: Boyuan Chen, Minghao Shao, Abdul Basit, Siddharth Garg, Muhammad Shafique | Published: 2025-06-27 | Updated: 2025-08-13 FrameworkLarge Language Model脱獄攻撃手法 2025.06.27 2025.08.15 Literature Database