Taxonomy, Evaluation and Exploitation of IPI-Centric LLM Agent Defense Frameworks Authors: Zimo Ji, Xunguang Wang, Zongjie Li, Pingchuan Ma, Yudong Gao, Daoyuan Wu, Xincheng Yan, Tian Tian, Shuai Wang | Published: 2025-11-19 Indirect Prompt InjectionPrompt leakingAdaptive Misuse Detection 2025.11.19 2025.11.21 Literature Database
Sigil: Server-Enforced Watermarking in U-Shaped Split Federated Learning via Gradient Injection Authors: Zhengchunmin Dai, Jiaxiong Tang, Peng Sun, Honglong Chen, Liantao Wu | Published: 2025-11-18 Robustness Verification MethodWatermark EvaluationAdaptive Misuse Detection 2025.11.18 2025.11.20 Literature Database
SGuard-v1: Safety Guardrail for Large Language Models Authors: JoonHo Lee, HyeonMin Cho, Jaewoong Yun, Hyunjae Lee, JunKyu Lee, Juree Seok | Published: 2025-11-16 Prompt InjectionMalicious PromptAdaptive Misuse Detection 2025.11.16 2025.11.18 Literature Database
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks Authors: Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze | Published: 2023-11-16 | Updated: 2023-12-19 Rule AttributionAttack MethodAdaptive Misuse Detection 2023.11.16 2025.05.28 Literature Database
Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification Authors: Atefeh Mahdavi, Neda Keivandarian, Marco Carvalho | Published: 2023-08-29 Text Generation MethodAdversarial TrainingAdaptive Misuse Detection 2023.08.29 2025.05.28 Literature Database
Instance Enhancement Batch Normalization: an Adaptive Regulator of Batch Noise Authors: Senwei Liang, Zhongzhan Huang, Mingfu Liang, Haizhao Yang | Published: 2019-08-12 | Updated: 2019-09-18 Training MethodDeep Reinforcement LearningAdaptive Misuse Detection 2019.08.12 2025.05.28 Literature Database