Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems Authors: Paul Badu Yakubu, Lesther Santana, Mohamed Rahouti, Yufeng Xin, Abdellah Chehri, Mohammed Aledhari | Published: 2025-11-06 Traffic Characteristic AnalysisModel DoSFeature Importance Analysis 2025.11.06 2025.11.08 Literature Database
AdaDoS: Adaptive DoS Attack via Deep Adversarial Reinforcement Learning in SDN Authors: Wei Shao, Yuhao Wang, Rongguang He, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-10-23 DoS MitigationNetwork Threat DetectionModel DoS 2025.10.23 2025.10.25 Literature Database
VERA-V: Variational Inference Framework for Jailbreaking Vision-Language Models Authors: Qilin Liao, Anamika Lochab, Ruqi Zhang | Published: 2025-10-20 Model DoSLarge Language ModelUntargeted Toxicity Attack 2025.10.20 2025.10.22 Literature Database
STAF: Leveraging LLMs for Automated Attack Tree-Based Security Test Generation Authors: Tanmay Khule, Stefan Marksteiner, Jose Alguindigue, Hannes Fuchs, Sebastian Fischmeister, Apurva Narayan | Published: 2025-09-24 セキュリティ検証手法Test Case GenerationModel DoS 2025.09.24 2025.09.26 Literature Database
LLMs as verification oracles for Solidity Authors: Massimo Bartoletti, Enrico Lipparini, Livio Pompianu | Published: 2025-09-23 Prompt InjectionModel DoSVulnerability Assessment Method 2025.09.23 2025.09.25 Literature Database
SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models Authors: Haotian Xu, Qingsong Peng, Jie Shi, Huadi Zheng, Yu Li, Cheng Zhuo | Published: 2025-09-22 Indirect Prompt InjectionModel DoS評価メトリクス 2025.09.22 2025.09.24 Literature Database
Exploit Tool Invocation Prompt for Tool Behavior Hijacking in LLM-Based Agentic System Authors: Yu Liu, Yuchong Xie, Mingyu Luo, Zesen Liu, Zhixiang Zhang, Kaikai Zhang, Zongjie Li, Ping Chen, Shuai Wang, Dongdong She | Published: 2025-09-06 | Updated: 2025-09-15 Prompt InjectionModel DoSAttack Evaluation 2025.09.06 2025.09.17 Literature Database
ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models Authors: Zihan Wang, Rui Zhang, Hongwei Li, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Guowen Xu | Published: 2025-08-02 | Updated: 2025-08-05 Backdoor DetectionBackdoor Attack TechniquesModel DoS 2025.08.02 2025.08.07 Literature Database
When LLMs Copy to Think: Uncovering Copy-Guided Attacks in Reasoning LLMs Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Fengyuan Xu, Xiuzhen Cheng, Sheng Zhong | Published: 2025-07-22 Prompt leakingModel DoSAttack Method 2025.07.22 2025.07.24 Literature Database
Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection Authors: Ziqi Miao, Yi Ding, Lijun Li, Jing Shao | Published: 2025-07-03 Prompt InjectionModel DoSAdversarial Attack Methods 2025.07.03 2025.07.05 Literature Database