Model Inversion Attacks Meet Cryptographic Fuzzy Extractors Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29 Membership InferenceModel InversionDefense Method 2025.10.29 2025.10.31 Literature Database
NetEcho: From Real-World Streaming Side-Channels to Full LLM Conversation Recovery Authors: Zheng Zhang, Guanlong Wu, Sen Deng, Shuai Wang, Yinqian Zhang | Published: 2025-10-29 Network Traffic AnalysisModel Extraction AttackDefense Method 2025.10.29 2025.10.31 Literature Database
An In-Depth Analysis of Cyber Attacks in Secured Platforms Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29 Cyber ThreatPrivacy LeakageDefense Method 2025.10.29 2025.10.31 Literature Database
Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs Authors: Man Hu, Xinyi Wu, Zuofeng Suo, Jinbo Feng, Linghui Meng, Yanhao Jia, Anh Tuan Luu, Shuai Zhao | Published: 2025-10-09 Prompt leaking推論に基づくバックドア攻撃Defense Method 2025.10.09 2025.10.11 Literature Database
DDoS Attacks in Cloud Computing: Detection and Prevention Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19 Resource Usage AnalysisAttack TypeDefense Method 2025.08.19 2025.08.21 Literature Database
Secure Tug-of-War (SecTOW): Iterative Defense-Attack Training with Reinforcement Learning for Multimodal Model Security Authors: Muzhi Dai, Shixuan Liu, Zhiyuan Zhao, Junyu Gao, Hao Sun, Xuelong Li | Published: 2025-07-29 Reward Mechanism DesignReinforcement Learning OptimizationDefense Method 2025.07.29 2025.07.31 Literature Database
Thought Purity: Defense Paradigm For Chain-of-Thought Attack Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16 Information SecurityThreat modelingDefense Method 2025.07.16 2025.07.18 Literature Database
Defending Against Prompt Injection With a Few DefensiveTokens Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10 Indirect Prompt InjectionPrompt leakingDefense Method 2025.07.10 2025.07.12 Literature Database
May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes | Published: 2025-07-10 Indirect Prompt InjectionAdversarial attackDefense Method 2025.07.10 2025.07.12 Literature Database
iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor System-on-Chips Authors: Mehdi Elahi, Mohamed R. Elshamy, Abdel-Hameed Badawy, Ahmad Patooghy | Published: 2025-07-08 Hardware Trojan DetectionThreat ModelDefense Method 2025.07.08 2025.07.10 Literature Database