PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization Authors: Yang Jiao, Xiaodong Wang, Kai Yang | Published: 2025-04-10 2025.04.10 文献データベース
LLM-IFT: LLM-Powered Information Flow Tracking for Secure Hardware Authors: Nowfel Mashnoor, Mohammad Akyash, Hadi Kamali, Kimia Azar | Published: 2025-04-09 2025.04.09 文献データベース
Large-Scale (Semi-)Automated Security Assessment of Consumer IoT Devices — A Roadmap Authors: Pascal Schöttle, Matthias Janetschek, Florian Merkle, Martin Nocker, Christoph Egger | Published: 2025-04-09 2025.04.09 文献データベース
Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs Authors: Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen | Published: 2025-04-08 2025.04.08 文献データベース
CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis Authors: Sofia Della Penna, Roberto Natella, Vittorio Orbinato, Lorenzo Parracino, Luciano Pianese | Published: 2025-04-08 2025.04.08 文献データベース
Separator Injection Attack: Uncovering Dialogue Biases in Large Language Models Caused by Role Separators Authors: Xitao Li, Haijun Wang, Jiang Wu, Ting Liu | Published: 2025-04-08 2025.04.08 文献データベース
Sugar-Coated Poison: Benign Generation Unlocks LLM Jailbreaking Authors: Yu-Hang Wu, Yu-Jie Xiong, Jie-Zhang | Published: 2025-04-08 2025.04.08 文献データベース
Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07 2025.04.07 文献データベース
Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM Authors: Jiuyang Bu, Wenkai Li, Zongwei Li, Zeng Zhang, Xiaoqi Li | Published: 2025-04-07 2025.04.07 文献データベース
Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07 2025.04.07 文献データベース