文献データベース

PiMRef: Detecting and Explaining Ever-evolving Spear Phishing Emails with Knowledge Base Invariants

Authors: Ruofan Liu, Yun Lin, Silas Yeo Shuen Yu, Xiwen Teoh, Zhenkai Liang, Jin Song Dong | Published: 2025-07-21
ソーシャルエンジニアリング攻撃
ビジネスメール詐欺
特徴抽出

Fake or Real: The Impostor Hunt in Texts for Space Operations

Authors: Agata Kaczmarek, Dawid Płudowski, Piotr Wilczyński, Przemysław Biecek, Krzysztof Kotowski, Ramez Shendy, Jakub Nalepa, Artur Janicki, Evridiki Ntagiou | Published: 2025-07-17 | Updated: 2025-07-21
データ毒性
偽情報の検出
出力の有害度の算出

A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models

Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17
IoTデータ分析タスク
性能評価手法
特徴抽出

MAD-Spear: A Conformity-Driven Prompt Injection Attack on Multi-Agent Debate Systems

Authors: Yu Cui, Hongyang Du | Published: 2025-07-17
セキュリティ戦略生成
プロンプトリーキング
攻撃者の行動分析

Thought Purity: Defense Paradigm For Chain-of-Thought Attack

Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16
情報セキュリティ
脅威モデリング
防御手法

LLAMA: Multi-Feedback Smart Contract Fuzzing Framework with LLM-Guided Seed Generation

Authors: Keke Gai, Haochen Liang, Jing Yu, Liehuang Zhu, Dusit Niyato | Published: 2025-07-16
プロンプトインジェクション
初期シード生成
性能評価指標

From Semantic Web and MAS to Agentic AI: A Unified Narrative of the Web of Agents

Authors: Tatiana Petrova, Boris Bliznioukov, Aleksandr Puzikov, Radu State | Published: 2025-07-14 | Updated: 2025-07-16
AIエージェントの相互作用
RAG
標準化と相互運用性

The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents

Authors: Lixu Wang, Kaixiang Yao, Xinfeng Li, Dong Yang, Haoyang Li, Xiaofeng Wang, Wei Dong | Published: 2025-07-14 | Updated: 2025-08-20
プライバシー設計原則
プロンプトリーキング
音声認識システムのセキュリティ

White-Basilisk: A Hybrid Model for Code Vulnerability Detection

Authors: Ioannis Lamprou, Alexander Shevtsov, Ioannis Arapakis, Sotiris Ioannidis | Published: 2025-07-11 | Updated: 2025-07-31
ハイブリッド分析
深層学習手法
脆弱性分析

Defending Against Prompt Injection With a Few DefensiveTokens

Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10
インダイレクトプロンプトインジェクション
プロンプトリーキング
防御手法