研究方法論

APFuzz: Towards Automatic Greybox Protocol Fuzzing

Authors: Yu Wang, Yang Xiang, Chandra Thapa, Hajime Suzuki | Published: 2026-02-25
プロトコルファジング
プロンプトインジェクション
研究方法論

Dirichlet Scale Mixture Priors for Bayesian Neural Networks

Authors: August Arnstad, Leiv Rønneberg, Geir Storvik | Published: 2026-02-23
モデル識別
研究方法論
高次元データ分析

Can You Trust What You See? Alpha Channel No-Box Attacks on Video Object Detection

Authors: Ariana Yi, Ce Zhou, Liyang Xiao, Qiben Yan | Published: 2025-10-22
プラットフォームアーキテクチャ
モデルの堅牢性
研究方法論

Send to which account? Evaluation of an LLM-based Scambaiting System

Authors: Hossein Siadati, Haadi Jafarian, Sima Jafarikhah | Published: 2025-09-10
LLMの安全機構の解除
研究方法論
詐欺対策

A Transformer-Based Approach for DDoS Attack Detection in IoT Networks

Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14
データ収集
性能評価
研究方法論

Gaze3P: Gaze-Based Prediction of User-Perceived Privacy

Authors: Mayar Elfares, Pascal Reisert, Ralf Küsters, Andreas Bulling | Published: 2025-07-01 | Updated: 2025-09-10
プライバシー手法
プライバシー評価
研究方法論

PRISON: Unmasking the Criminal Potential of Large Language Models

Authors: Xinyi Wu, Geng Hong, Pei Chen, Yueyue Chen, Xudong Pan, Min Yang | Published: 2025-06-19 | Updated: 2025-08-04
LLMの安全機構の解除
法執行回避
研究方法論

LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy

Authors: Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy | Published: 2025-05-24 | Updated: 2025-06-23
LLMとAPTの関係
情報セキュリティ
研究方法論

Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version)

Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23
ネットワーク脅威検出
研究方法論
透かし

On Benchmarking Code LLMs for Android Malware Analysis

Authors: Yiling He, Hongyu She, Xingzhi Qian, Xinran Zheng, Zhuo Chen, Zhan Qin, Lorenzo Cavallaro | Published: 2025-04-01 | Updated: 2025-04-23
LLM性能評価
マルウェア検出手法
研究方法論