Showing 221–240 of 468 results
/ Date/ Name
Dec 20, 2025Conscious Data Contribution via Community-Driven Chain-of-Thought DistillationDec 10, 2025Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch NetworksDec 10, 2025ZeroOS: A Universal Modular Library OS for zkVMsDec 5, 2025Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image ModelsNov 21, 2025ThreadFuzzer: Fuzzing Framework for Thread ProtocolNov 18, 2025FLARE: Adaptive Multi-Dimensional Reputation for Robust Client Reliability in Federated LearningNov 17, 2025SafeGRPO: Self-Rewarded Multimodal Safety Alignment via Rule-Governed Policy OptimizationOct 24, 2025AgentBound: Securing Execution Boundaries of AI AgentsOct 16, 2025Beyond a Single Perspective: Towards a Realistic Evaluation of Website Fingerprinting AttacksOct 14, 2025Elevating Medical Image Security: A Cryptographic Framework Integrating Hyperchaotic Map and GRUOct 13, 2025TDADL-IE: A Deep Learning-Driven Cryptographic Architecture for Medical Image SecurityOct 8, 2025Exposing LLM User Privacy via Traffic Fingerprint Analysis: A Study of Privacy Risks in LLM Agent InteractionsSep 26, 2025SecureVibeBench: Benchmarking Secure Vibe Coding of AI Agents via Reconstructing Vulnerability-Introducing ScenariosSep 15, 2025A Practical Adversarial Attack against Sequence-based Deep Learning Malware ClassifiersSep 10, 2025Cross-Service Token: Finding Attacks in 5G Core NetworksSep 6, 2025Red-Teaming Coding Agents from a Tool-Invocation Perspective: An Empirical Security AssessmentSep 4, 2025Revisiting Third-Party Library Detection: A Ground Truth Dataset and Its Implications Across Security TasksSep 2, 2025Privacy-Utility Trade-off in Data Publication: A Bilevel Optimization Framework with Curvature-Guided PerturbationAug 6, 2025Prompt Injection Vulnerability of Consensus Generating Applications in Digital DemocracyAug 5, 2025When Good Sounds Go Adversarial: Jailbreaking Audio-Language Models with Benign Inputs