Information Security

LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy

Authors: Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy | Published: 2025-05-24 | Updated: 2025-06-23
LLMとAPTの関係
Information Security
Research Methodology

Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection

Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07
Prompt leaking
Information Security
Adversarial Example

No Free Lunch with Guardrails

Authors: Divyanshu Kumar, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2025-04-01 | Updated: 2025-04-03
Prompt Injection
Model DoS
Information Security

Models That Are Interpretable But Not Transparent

Authors: Chudi Zhong, Panyu Chen, Cynthia Rudin | Published: 2025-02-26
Method for Providing Explainability while Keeping Model Information Confidential
Information Security
Attacker Behavior Analysis

Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs

Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07
LLM Application
Risk Analysis Method
Information Security

Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense

Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15
Prompt leaking
Model DoS
Information Security

A Chatbot for Information Security

Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01
Abuse of AI Chatbots
Advice Provision
Information Security

S3ML: A Secure Serving System for Machine Learning Inference

Authors: Junming Ma, Chaofan Yu, Aihui Zhou, Bingzhe Wu, Xibin Wu, Xingyu Chen, Xiangqun Chen, Lei Wang, Donggang Cao | Published: 2020-10-13
SGX Application Development
Information Security
Machine Learning

Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper)

Authors: Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh | Published: 2020-10-12
Information Security
Threat Model

Detection of Iterative Adversarial Attacks via Counter Attack

Authors: Matthias Rottmann, Kira Maag, Mathis Peyron, Natasa Krejic, Hanno Gottschalk | Published: 2020-09-23 | Updated: 2021-03-23
Robustness
Information Security
Selection and Evaluation of Optimization Algorithms