Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23 2025.06.23 文献データベース
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23 2025.06.23 文献データベース
Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Authors: Lei Yu, Zhirong Huang, Hang Yuan, Shiqi Cheng, Li Yang, Fengjun Zhang, Chenjie Shen, Jiajia Ma, Jingyuan Zhang, Junyi Lu, Chun Zuo | Published: 2025-06-23 2025.06.23 文献データベース
Byzantine Failures Harm the Generalization of Robust Distributed Learning Algorithms More Than Data Poisoning Authors: Thomas Boudou, Batiste Le Bars, Nirupam Gupta, Aurélien Bellet | Published: 2025-06-22 | Updated: 2025-10-16 2025.06.22 文献データベース
SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24 2025.06.21 文献データベース
VReaves: Eavesdropping on Virtual Reality App Identity and Activity via Electromagnetic Side Channels Authors: Wei Sun, Minghong Fang, Mengyuan Li | Published: 2025-06-21 | Updated: 2025-06-24 2025.06.21 文献データベース
Sharpening Kubernetes Audit Logs with Context Awareness Authors: Matteo Franzil, Valentino Armani, Luis Augusto Dias Knob, Domenico Siracusa | Published: 2025-06-19 | Updated: 2025-10-27 2025.06.19 文献データベース
PRISON: Unmasking the Criminal Potential of Large Language Models Authors: Xinyi Wu, Geng Hong, Pei Chen, Yueyue Chen, Xudong Pan, Min Yang | Published: 2025-06-19 | Updated: 2025-08-04 2025.06.19 文献データベース
Privacy-Preserving LLM Interaction with Socratic Chain-of-Thought Reasoning and Homomorphically Encrypted Vector Databases Authors: Yubeen Bae, Minchan Kim, Jaejin Lee, Sangbum Kim, Jaehyung Kim, Yejin Choi, Niloofar Mireshghallah | Published: 2025-06-19 | Updated: 2025-07-01 2025.06.19 文献データベース
ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis Authors: Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu | Published: 2025-06-18 | Updated: 2025-07-08 2025.06.18 文献データベース