StruPhantom: Evolutionary Injection Attacks on Black-Box Tabular Agents Powered by Large Language Models Authors: Yang Feng, Xudong Pan | Published: 2025-04-14 LLM Performance EvaluationIndirect Prompt InjectionMalicious Website Detection 2025.04.14 2025.05.27 Literature Database
An Investigation of Large Language Models and Their Vulnerabilities in Spam Detection Authors: Qiyao Tang, Xiangyang Li | Published: 2025-04-14 LLM Performance EvaluationPrompt InjectionModel DoS 2025.04.14 2025.05.27 Literature Database
PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization Authors: Yang Jiao, Xiaodong Wang, Kai Yang | Published: 2025-04-10 | Updated: 2025-04-17 LLM Performance EvaluationPoisoning attack on RAGAdversarial Attack Assessment 2025.04.10 2025.05.27 Literature Database
TrafficLLM: Enhancing Large Language Models for Network Traffic Analysis with Generic Traffic Representation Authors: Tianyu Cui, Xinjie Lin, Sijia Li, Miao Chen, Qilei Yin, Qi Li, Ke Xu | Published: 2025-04-05 | Updated: 2025-04-15 LLM Performance EvaluationTask-Specific TuningModel Robustness 2025.04.05 2025.05.27 Literature Database
On Benchmarking Code LLMs for Android Malware Analysis Authors: Yiling He, Hongyu She, Xingzhi Qian, Xinran Zheng, Zhuo Chen, Zhan Qin, Lorenzo Cavallaro | Published: 2025-04-01 | Updated: 2025-04-23 LLM Performance EvaluationMalware Detection MethodResearch Methodology 2025.04.01 2025.05.27 Literature Database
Queueing, Predictions, and LLMs: Challenges and Open Problems Authors: Michael Mitzenmacher, Rana Shahout | Published: 2025-03-10 LLM Performance EvaluationScheduling MethodPrediction-Based Scheduling 2025.03.10 2025.05.27 Literature Database
AgentBreeder: Mitigating the AI Safety Impact of Multi-Agent Scaffolds via Self-Improvement Authors: J Rosser, Jakob Nicolaus Foerster | Published: 2025-02-02 | Updated: 2025-04-14 LLM Performance EvaluationMulti-Objective OptimizationSafety Alignment 2025.02.02 2025.05.27 Literature Database
Logic Meets Magic: LLMs Cracking Smart Contract Vulnerabilities Authors: ZeKe Xiao, Qin Wang, Hammond Pearce, Shiping Chen | Published: 2025-01-13 LLM Performance EvaluationCybersecuritySmart Contract 2025.01.13 2025.05.27 Literature Database
MPCache: MPC-Friendly KV Cache Eviction for Efficient Private Large Language Model Inference Authors: Wenxuan Zeng, Ye Dong, Jinjin Zhou, Junming Ma, Jin Tan, Runsheng Wang, Meng Li | Published: 2025-01-12 LLM Performance EvaluationMPC AlgorithmToken Collection Method 2025.01.12 2025.05.27 Literature Database
Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09 LLM Performance EvaluationPrompt InjectionVulnerability Management 2025.01.09 2025.05.27 Literature Database