THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models Authors: Yujin Huang, Zhi Zhang, Qingchuan Zhao, Xingliang Yuan, Chunyang Chen | Published: 2025-03-31 Prompt leakingModel Protection MethodsModel Extraction Attack 2025.03.31 2025.05.27 Literature Database
Large Language Models are Unreliable for Cyber Threat Intelligence Authors: Emanuele Mezzi, Fabio Massacci, Katja Tuma | Published: 2025-03-29 | Updated: 2025-07-16 Few-Shot LearningPrompt leakingPerformance Evaluation Method 2025.03.29 2025.07.18 Literature Database
Large Language Models powered Network Attack Detection: Architecture, Opportunities and Case Study Authors: Xinggong Zhang, Qingyang Li, Yunpeng Tan, Zongming Guo, Lei Zhang, Yong Cui | Published: 2025-03-24 Prompt InjectionPrompt leakingIntrusion Detection System 2025.03.24 2025.05.27 Literature Database
Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19 Privacy Protection MethodPrompt leakingDeep Learning 2025.03.19 2025.05.27 Literature Database
Temporal Context Awareness: A Defense Framework Against Multi-turn Manipulation Attacks on Large Language Models Authors: Prashant Kulkarni, Assaf Namer | Published: 2025-03-18 Prompt InjectionPrompt leakingAttack Method 2025.03.18 2025.05.27 Literature Database
VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding Authors: Zeng Wang, Minghao Shao, Mohammed Nabeel, Prithwish Basu Roy, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-03-17 | Updated: 2025-04-14 Data Protection MethodPrivacy Protection MethodPrompt leaking 2025.03.17 2025.05.27 Literature Database
VeriContaminated: Assessing LLM-Driven Verilog Coding for Data Contamination Authors: Zeng Wang, Minghao Shao, Jitendra Bhandari, Likhitha Mankali, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-03-17 | Updated: 2025-04-14 FPGAProgram Interpretation GraphPrompt leaking 2025.03.17 2025.05.27 Literature Database
CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE Detection Authors: Richard A. Dubniczky, Krisztofer Zoltán Horvát, Tamás Bisztray, Mohamed Amine Ferrag, Lucas C. Cordeiro, Norbert Tihanyi | Published: 2025-03-12 | Updated: 2025-03-31 Security MetricPrompt leakingVulnerability Mitigation Technique 2025.03.12 2025.05.27 Literature Database
Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16 Cyber Threat IntelligencePrompt leakingModel Extraction Attack 2025.02.28 2025.05.27 Literature Database
Protecting Users From Themselves: Safeguarding Contextual Privacy in Interactions with Conversational Agents Authors: Ivoline Ngong, Swanand Kadhe, Hao Wang, Keerthiram Murugesan, Justin D. Weisz, Amit Dhurandhar, Karthikeyan Natesan Ramamurthy | Published: 2025-02-22 | Updated: 2025-07-28 Privacy Risk ManagementPrompt leakingWatermark Evaluation 2025.02.22 2025.07.30 Literature Database