Model DoS

SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports

Authors: Sogol Masoumzadeh, Yufei Li, Shane McIntosh, Dániel Varró, Lili Wei | Published: 2025-12-17
Model DoS
Performance Evaluation
Deep Learning Technology

TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection

Authors: Jian-Yu Jiang-Lin, Kang-Yang Huang, Ling Zou, Ling Lo, Sheng-Ping Yang, Yu-Wen Tseng, Kun-Hsiang Lin, Chia-Ling Chen, Yu-Ting Ta, Yan-Tsung Wang, Po-Ching Chen, Hongxia Xie, Hong-Han Shuai, Wen-Huang Cheng | Published: 2025-12-11
Detection of Hallucinations
Model DoS
Evaluation Method

Amulet: Fast TEE-Shielded Inference for On-Device Model Protection

Authors: Zikai Mao, Lingchen Zhao, Lei Xu, Wentao Dong, Shenyi Zhang, Cong Wang, Qian Wang | Published: 2025-12-08
Cybersecurity
Privacy Analysis
Model DoS

ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking

Authors: Yunzhe Li, Jianan Wang, Hongzi Zhu, James Lin, Shan Chang, Minyi Guo | Published: 2025-12-08
DoS Mitigation
Prompt Injection
Model DoS

A Light-Weight Large Language Model File Format for Highly-Secure Model Distribution

Authors: Huifeng Zhu, Shijie Li, Qinfeng Li, Yier Jin | Published: 2025-12-04
Model DoS
Detection of Model Extraction Attacks
Information Security

HarnessAgent: Scaling Automatic Fuzzing Harness Construction with Tool-Augmented LLM Pipelines

Authors: Kang Yang, Yunhang Zhang, Zichuan Li, GuanHong Tao, Jun Xu, XiaoJing Liao | Published: 2025-12-03
Prompt Injection
Model DoS
自動化ペネトレーションテスト

Contextual Image Attack: How Visual Context Exposes Multimodal Safety Vulnerabilities

Authors: Yuan Xiong, Ziqi Miao, Lijun Li, Chen Qian, Jie Li, Jing Shao | Published: 2025-12-02
Prompt Injection
Model DoS
Image Generation Technology

DefenSee: Dissecting Threat from Sight and Text – A Multi-View Defensive Pipeline for Multi-modal Jailbreaks

Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-12-01
Prompt Injection
Model DoS
Robustness Improvement Method

TZ-LLM: Protecting On-Device Large Language Models with Arm TrustZone

Authors: Xunjie Wang, Jiacheng Shi, Zihan Zhao, Yang Yu, Zhichao Hua, Jinyu Gu | Published: 2025-11-17
Prompt leaking
Model DoS
Performance Evaluation Metrics

Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems

Authors: Paul Badu Yakubu, Lesther Santana, Mohamed Rahouti, Yufeng Xin, Abdellah Chehri, Mohammed Aledhari | Published: 2025-11-06
Traffic Characteristic Analysis
Model DoS
Feature Importance Analysis