Generalizable and Interpretable RF Fingerprinting with Shapelet-Enhanced Large Language Models Authors: Tianya Zhao, Junqing Zhang, Haowen Xu, Xiaoyan Sun, Jun Dai, Xuyu Wang | Published: 2026-02-03 LLM Performance EvaluationFingerprinting MethodPrompt validation 2026.02.03 2026.02.05 Literature Database
WorldCup Sampling for Multi-bit LLM Watermarking Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02 LLM Performance EvaluationAlgorithm DesignWatermarking 2026.02.02 2026.02.04 Literature Database
User-Centric Phishing Detection: A RAG and LLM-Based Approach Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29 LLM Performance EvaluationPoisoning attack on RAGユーザー中心のフィッシング検出 2026.01.29 2026.01.31 Literature Database
Eliciting Least-to-Most Reasoning for Phishing URL Detection Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.01.28 2026.01.30 Literature Database
GAVEL: Towards rule-based safety through activation monitoring Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27 LLM Performance EvaluationIndirect Prompt InjectionData Generation Method 2026.01.27 2026.01.29 Literature Database
Towards a standardized methodology and dataset for evaluating LLM-based digital forensic timeline analysis Authors: Hudan Studiawan, Frank Breitinger, Mark Scanlon | Published: 2025-05-06 LLM Performance EvaluationLarge Language ModelEvaluation Method 2025.05.06 2025.05.27 Literature Database
LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems Authors: Yazan Otoum, Arghavan Asad, Amiya Nayak | Published: 2025-05-01 | Updated: 2025-05-13 Bias Detection in AI OutputLLM Performance EvaluationPrompt Injection 2025.05.01 2025.05.27 Literature Database
Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30 LLM Performance EvaluationPoisoning attack on RAGAttack Type 2025.04.30 2025.05.27 Literature Database
Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23 LLM Performance EvaluationTraining MethodPrompt leaking 2025.04.23 2025.05.27 Literature Database
aiXamine: Simplified LLM Safety and Security Authors: Fatih Deniz, Dorde Popovic, Yazan Boshmaf, Euisuh Jeong, Minhaj Ahmad, Sanjay Chawla, Issa Khalil | Published: 2025-04-21 | Updated: 2025-04-23 LLM Performance EvaluationAlignmentPerformance Evaluation 2025.04.21 2025.05.27 Literature Database