Large Language Models for Cyber Security Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06 Poisoning attack on RAGIndirect Prompt InjectionInformation Security 2025.11.06 2025.11.08 Literature Database
Black-Box Guardrail Reverse-engineering Attack Authors: Hongwei Yao, Yun Xia, Shuo Shao, Haoran Shi, Tong Qiao, Cong Wang | Published: 2025-11-06 Disabling Safety Mechanisms of LLMPrompt leakingInformation Security 2025.11.06 2025.11.08 Literature Database
Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback Authors: Shiyin Lin | Published: 2025-11-06 Prompt InjectionDynamic AnalysisInformation Security 2025.11.06 2025.11.08 Literature Database
Measuring the Security of Mobile LLM Agents under Adversarial Prompts from Untrusted Third-Party Channels Authors: Chenghao Du, Quanfeng Huang, Tingxuan Tang, Zihao Wang, Adwait Nadkarni, Yue Xiao | Published: 2025-10-31 | Updated: 2025-11-06 Indirect Prompt InjectionPrompt InjectionInformation Security 2025.10.31 2025.11.08 Literature Database
SimKey: A Semantically Aware Key Module for Watermarking Language Models Authors: Shingo Kodama, Haya Diwan, Lucas Rosenblatt, R. Teal Witter, Niv Cohen | Published: 2025-10-11 | Updated: 2025-11-03 Privacy ProtectionInformation SecurityGenerative Adversarial Network 2025.10.11 2025.11.05 Literature Database
MeAJOR Corpus: A Multi-Source Dataset for Phishing Email Detection Authors: Paulo Mendes, Eva Maia, Isabel Praça | Published: 2025-07-23 | Updated: 2025-11-06 Dataset IntegrationInformation SecurityDeep Learning Method 2025.07.23 2025.11.08 Literature Database
Thought Purity: Defense Paradigm For Chain-of-Thought Attack Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16 Information SecurityThreat modelingDefense Method 2025.07.16 2025.07.18 Literature Database
ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis Authors: Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu | Published: 2025-06-18 | Updated: 2025-07-08 Event IdentificationInformation SecurityVulnerability Attack Method 2025.06.18 2025.07.10 Literature Database
Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World Authors: Huma Habib Shadan, Sardar Islam | Published: 2025-06-12 | Updated: 2025-07-08 Risk ManagementInformation Security量子コンピューティング 2025.06.12 2025.07.10 Literature Database
LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy Authors: Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy | Published: 2025-05-24 | Updated: 2025-06-23 LLMとAPTの関係Information SecurityResearch Methodology 2025.05.24 2025.06.25 Literature Database