From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis Authors: Dongchao Zhou, Lingyun Ying, Huajun Chai, Dongbin Wang | Published: 2025-12-16 JavaScriptの難読化技術Error Handling評価メトリクス 2025.12.16 2025.12.18 Literature Database
On the Effectiveness of Membership Inference in Targeted Data Extraction from Large Language Models Authors: Ali Al Sahili, Ali Chehab, Razane Tajeddine | Published: 2025-12-15 Data Extraction and AnalysisPrompt leaking評価メトリクス 2025.12.15 2025.12.17 Literature Database
One Size Fits All? A Modular Adaptive Sanitization Kit (MASK) for Customizable Privacy-Preserving Phone Scam Detection Authors: Kangzhong Wang, Zitong Shen, Youqian Zhang, Michael MK Cheung, Xiapu Luo, Grace Ngai, Eugene Yujun Fu | Published: 2025-10-21 Privacy-Preserving Machine LearningPrompt Injection評価メトリクス 2025.10.21 2025.10.23 Literature Database
QRïS: A Preemptive Novel Method for Quishing Detection Through Structural Features of QR Authors: Muhammad Wahid Akram, Keshav Sood, Muneeb Ul Hassan | Published: 2025-10-20 QRコード分類手法Feature Importance Analysis評価メトリクス 2025.10.20 2025.10.22 Literature Database
SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models Authors: Haotian Xu, Qingsong Peng, Jie Shi, Huadi Zheng, Yu Li, Cheng Zhuo | Published: 2025-09-22 Indirect Prompt InjectionModel DoS評価メトリクス 2025.09.22 2025.09.24 Literature Database
Breaking Out from the TESSERACT: Reassessing ML-based Malware Detection under Spatio-Temporal Drift Authors: Theo Chow, Mario D'Onghia, Lorenz Linhardt, Zeliang Kan, Daniel Arp, Lorenzo Cavallaro, Fabio Pierazzi | Published: 2025-06-30 BiasDataset for Malware Classification評価メトリクス 2025.06.30 2025.07.02 Literature Database
Counterfactual Influence as a Distributional Quantity Authors: Matthieu Meeus, Igor Shilov, Georgios Kaissis, Yves-Alexandre de Montjoye | Published: 2025-06-25 Privacy ProtectionPerformance Evaluation Metrics評価メトリクス 2025.06.25 2025.06.27 Literature Database
SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark Authors: Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang | Published: 2025-06-09 Model DoS再構成アルゴリズム評価メトリクス 2025.06.09 2025.06.11 Literature Database
PsyScam: A Benchmark for Psychological Techniques in Real-World Scams Authors: Shang Ma, Tianyi Ma, Jiahao Liu, Wei Song, Zhenkai Liang, Xusheng Xiao, Yanfang Ye | Published: 2025-05-21 | Updated: 2025-09-22 Phishing Attack心理的手法評価メトリクス 2025.05.21 2025.09.24 Literature Database
Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features Authors: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, Muhyun Kim, Feng Chen, Murat Kantarcioglu, Kangkook Jee | Published: 2023-06-01 | Updated: 2025-09-22 Security AnalysisMalware Detection Scenario評価メトリクス 2023.06.01 2025.09.24 Literature Database