Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation

Authors: Joshua Chiu, Partha Protim Paul, Zahin Wahab | Published: 2025-04-29

The Automation Advantage in AI Red Teaming

Authors: Rob Mulla, Will Pearce, Nick Landers, Brian Greunke, Brad Palm, Vincent Abruzzo, Ads Dawson | Published: 2025-04-28

$\texttt{SAGE}$: A Generic Framework for LLM Safety Evaluation

Authors: Madhur Jindal, Hari Shrawgi, Parag Agrawal, Sandipan Dandapat | Published: 2025-04-28

BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts

Authors: Qingyue Wang, Qi Pang, Xixun Lin, Shuai Wang, Daoyuan Wu | Published: 2025-04-24 | Updated: 2025-04-29

Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations

Authors: Ahod Alghuried, Ali Alkinoon, Abdulaziz Alghamdi, Soohyeon Choi, Manar Mohaisen, David Mohaisen | Published: 2025-04-24

Quantum Autoencoder for Multivariate Time Series Anomaly Detection

Authors: Kilian Tscharke, Maximilian Wendlinger, Afrae Ahouzi, Pallavi Bhardwaj, Kaweh Amoi-Taleghani, Michael Schrödl-Baumann, Pascal Debus | Published: 2025-04-24

Automatically Generating Rules of Malicious Software Packages via Large Language Model

Authors: XiangRui Zhang, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li | Published: 2025-04-24

Steering the CensorShip: Uncovering Representation Vectors for LLM “Thought” Control

Authors: Hannah Cyberey, David Evans | Published: 2025-04-23

Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version)

Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23

MCMC for Bayesian estimation of Differential Privacy from Membership Inference Attacks

Authors: Ceren Yildirim, Kamer Kaya, Sinan Yildirim, Erkay Savas | Published: 2025-04-23