Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-08-11 FrameworkPrompt InjectionPerformance Evaluation Method 2025.08.11 2025.08.13 Literature Database
Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs) Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07 IoTネットワーク攻撃Performance Evaluation MethodWatermark Design 2025.08.07 2025.08.09 Literature Database
PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07 RAGPerformance Evaluation MethodDeep Learning 2025.08.07 2025.08.09 Literature Database
Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07 Poisoning attack on RAGReinforcement LearningPerformance Evaluation Method 2025.08.07 2025.08.09 Literature Database
Matrix-Free Two-to-Infinity and One-to-Two Norms Estimation Authors: Askar Tsyganov, Evgeny Frolov, Sergey Samsonov, Maxim Rakhuba | Published: 2025-08-06 Robust OptimizationPerformance Evaluation MethodDeep Learning 2025.08.06 2025.08.08 Literature Database
A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17 IoT Data Analysis TaskPerformance Evaluation MethodFeature Extraction 2025.07.17 2025.07.19 Literature Database
Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017 Authors: Zhaoyang Xu, Yunbo Liu | Published: 2025-06-23 | Updated: 2025-08-11 Certified RobustnessPerformance Evaluation MethodAnomaly Detection Method 2025.06.23 2025.08.13 Literature Database
Improving LLM Outputs Against Jailbreak Attacks with Expert Model Integration Authors: Tatia Tsmindashvili, Ana Kolkhidashvili, Dachi Kurtskhalia, Nino Maghlakelidze, Elene Mekvabishvili, Guram Dentoshvili, Orkhan Shamilov, Zaal Gachechiladze, Steven Saporta, David Dachi Choladze | Published: 2025-05-18 | Updated: 2025-08-11 Prompt InjectionLarge Language ModelPerformance Evaluation Method 2025.05.18 2025.08.13 Literature Database
Network Attack Traffic Detection With Hybrid Quantum-Enhanced Convolution Neural Network Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-04-29 Performance Evaluation MethodAttack DetectionQuantum Framework 2025.04.29 2025.05.27 Literature Database
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16 Privacy Enhancing ProtocolPerformance Evaluation MethodWatermark Design 2025.04.16 2025.05.27 Literature Database