Phishing Detection in the Gen-AI Era: Quantized LLMs vs Classical Models Authors: Jikesh Thapa, Gurrehmat Chahal, Serban Voinea Gabreanu, Yazan Otoum | Published: 2025-07-10 Performance EvaluationPrompt Injection次世代フィッシング検出 2025.07.10 2025.07.12 Literature Database
CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations Authors: Xiaohu Li, Yunfeng Ning, Zepeng Bao, Mayi Xu, Jianhao Chen, Tieyun Qian | Published: 2025-07-08 Prompt InjectionAdversarial attackDefense Effectiveness Analysis 2025.07.08 2025.07.10 Literature Database
Large Language Models for Network Intrusion Detection Systems: Foundations, Implementations, and Future Directions Authors: Shuo Yang, Xinran Zheng, Xinchen Zhang, Jinfeng Xu, Jinze Li, Donglin Xie, Weicai Long, Edith C. H. Ngai | Published: 2025-07-07 Indirect Prompt InjectionPrompt InjectionRole of Artificial Intelligence 2025.07.07 2025.07.09 Literature Database
Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection Authors: Ziqi Miao, Yi Ding, Lijun Li, Jing Shao | Published: 2025-07-03 Prompt InjectionModel DoSAdversarial Attack Methods 2025.07.03 2025.07.05 Literature Database
Graph Representation-based Model Poisoning on Federated LLMs in CyberEdge Networks Authors: Hanlin Cai, Haofan Dong, Houtianfu Wang, Kai Li, Ozgur B. Akan | Published: 2025-07-02 Prompt InjectionPoisoning AttackMalicious Client 2025.07.02 2025.07.04 Literature Database
SafePTR: Token-Level Jailbreak Defense in Multimodal LLMs via Prune-then-Restore Mechanism Authors: Beitao Chen, Xinyu Lyu, Lianli Gao, Jingkuan Song, Heng Tao Shen | Published: 2025-07-02 Prompt Injection脱獄攻撃手法Transparency and Verification 2025.07.02 2025.07.04 Literature Database
Are AI-Generated Fixes Secure? Analyzing LLM and Agent Patches on SWE-bench Authors: Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee | Published: 2025-06-30 | Updated: 2025-07-24 Software SecurityPrompt InjectionLarge Language Model 2025.06.30 2025.07.26 Literature Database
RawMal-TF: Raw Malware Dataset Labeled by Type and Family Authors: David Bálik, Martin Jureček, Mark Stamp | Published: 2025-06-30 Backdoor DetectionPrompt InjectionDataset for Malware Classification 2025.06.30 2025.07.02 Literature Database
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models Authors: Dipayan Saha, Shams Tarek, Hasan Al Shaikh, Khan Thamid Hasan, Pavan Sai Nalluri, Md. Ajoad Hasan, Nashmin Alam, Jingbo Zhou, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2025-06-25 セキュリティ検証手法Prompt InjectionLarge Language Model 2025.06.25 2025.06.27 Literature Database
Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25 Prompt InjectionMemory Management MethodEvaluation Method 2025.06.25 2025.06.27 Literature Database