Multi-Agent Penetration Testing AI for the Web

Authors: Isaac David, Arthur Gervais | Published: 2025-08-28

CyberSleuth: Autonomous Blue-Team LLM Agent for Web Attack Forensics

Authors: Stefano Fumero, Kai Huang, Matteo Boffa, Danilo Giordano, Marco Mellia, Zied Ben Houidi, Dario Rossi | Published: 2025-08-28

Human-AI Collaborative Bot Detection in MMORPGs

Authors: Jaeman Son, Hyunsoo Kim | Published: 2025-08-28

Ransomware 3.0: Self-Composing and LLM-Orchestrated

Authors: Md Raz, Meet Udeshi, P. V. Sai Charan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2025-08-28

Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning

Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27

SoK: Large Language Model Copyright Auditing via Fingerprinting

Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27

AEGIS : Automated Co-Evolutionary Framework for Guarding Prompt Injections Schema

Authors: Ting-Chun Liu, Ching-Yu Hsu, Kuan-Yi Lee, Chi-An Fu, Hung-yi Lee | Published: 2025-08-27 | Updated: 2025-10-09

Safety Alignment Should Be Made More Than Just A Few Attention Heads

Authors: Chao Huang, Zefeng Zhang, Juewei Yue, Quangang Li, Chuang Zhang, Tingwen Liu | Published: 2025-08-27

Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses

Authors: Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong | Published: 2025-08-27

Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents

Authors: Zhixin Lin, Jungang Li, Shidong Pan, Yibo Shi, Yue Yao, Dongliang Xu | Published: 2025-08-27