📊 Статистика дайджестов
Всего дайджестов: 34022 Добавлено сегодня: 82
Последнее обновление: сегодня
Авторы:
Mingliang Hou, Yinuo Wang, Teng Guo, Zitao Liu, Wenzhou Dou, Jiaqi Zheng, Renqiang Luo, Mi Tian, Weiqi Luo
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
Cognitive diagnosis models (CDMs) are pivotal for creating fine-grained
learner profiles in modern intelligent education platforms. However, these
models are trained on sensitive student data, raising significant privacy
concerns. While membership inference attacks (MIA) have been studied in various
domains, their application to CDMs remains a critical research gap, leaving
their privacy risks unquantified. This paper is the first to systematically
investigate MIA against CDMs. We introduce a no...
📄 Trustworthiness Calibration Framework for Phishing Email Detection Using Large Language Models
2025-11-11Авторы:
Daniyal Ganiuly, Assel Smaiyl
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
Phishing emails continue to pose a persistent challenge to online
communication, exploiting human trust and evading automated filters through
realistic language and adaptive tactics. While large language models (LLMs)
such as GPT-4 and LLaMA-3-8B achieve strong accuracy in text classification,
their deployment in security systems requires assessing reliability beyond
benchmark performance. To address this, this study introduces the
Trustworthiness Calibration Framework (TCF), a reproducible meth...
Авторы:
Azhar Hussain Mozumder, M. John Basha, Chayapathi A. R
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
With more and more existing networks being transformed to Software-Defined
Networking (SDN), they need to be more secure and demand smarter ways of
traffic control. This work, SmartSecChain-SDN, is a platform that combines
machine learning based intrusion detection, blockchain-based storage of logs,
and application-awareness-based priority in SDN networks. To detect network
intrusions in a real-time, precision and low-false positives setup, the
framework utilizes the application of advanced mach...
📄 Exploratory Analysis of Cyberattack Patterns on E-Commerce Platforms Using Statistical Methods
2025-11-08Авторы:
Fatimo Adenike Adeniya
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
Cyberattacks on e-commerce platforms have grown in sophistication,
threatening consumer trust and operational continuity. This research presents a
hybrid analytical framework that integrates statistical modelling and machine
learning for detecting and forecasting cyberattack patterns in the e-commerce
domain. Using the Verizon Community Data Breach (VCDB) dataset, the study
applies Auto ARIMA for temporal forecasting and significance testing, including
a Mann-Whitney U test (U = 2579981.5, p = 0...
Авторы:
Arup Datta, Ahmed Aljohani, Hyunsook Do
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
Large language models (LLMs) are now widely used to draft and refactor code,
but code that works is not necessarily secure. We evaluate secure code
generation using the Instruct Prime, which eliminated compliance-required
prompts and cue contamination, and evaluate five instruction-tuned code LLMs
using a zero-shot baseline and a three-round reflexion prompting approach.
Security is measured using the Insecure Code Detector (ICD), and results are
reported by measuring Repair, Regression, and Net...
Авторы:
Shiyin Lin
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
Software fuzzing has become a cornerstone in automated vulnerability
discovery, yet existing mutation strategies often lack semantic awareness,
leading to redundant test cases and slow exploration of deep program states. In
this work, I present a hybrid fuzzing framework that integrates static and
dynamic analysis with Large Language Model (LLM)-guided input mutation and
semantic feedback. Static analysis extracts control-flow and data-flow
information, which is transformed into structured promp...
📄 Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems
2025-11-08Авторы:
Paul Badu Yakubu, Lesther Santana, Mohamed Rahouti, Yufeng Xin, Abdellah Chehri, Mohammed Aledhari
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
With the increasing frequency and sophistication of Distributed Denial of
Service (DDoS) attacks, it has become critical to develop more efficient and
interpretable detection methods. Traditional detection systems often struggle
with scalability and transparency, hindering real-time response and
understanding of attack vectors. This paper presents an automated framework for
detecting and interpreting DDoS attacks using machine learning (ML). The
proposed method leverages the Tree-based Pipeline ...
📄 Watermarking Large Language Models in Europe: Interpreting the AI Act in Light of Technology
2025-11-07Авторы:
Thomas Souverain
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
To foster trustworthy Artificial Intelligence (AI) within the European Union,
the AI Act requires providers to mark and detect the outputs of their
general-purpose models. The Article 50 and Recital 133 call for marking methods
that are ''sufficiently reliable, interoperable, effective and robust''. Yet,
the rapidly evolving and heterogeneous landscape of watermarks for Large
Language Models (LLMs) makes it difficult to determine how these four standards
can be translated into concrete and measu...
Авторы:
Geoff McDonald, Jonathan Bar Or
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
Large Language Models (LLMs) are increasingly deployed in sensitive domains
including healthcare, legal services, and confidential communications, where
privacy is paramount. This paper introduces Whisper Leak, a side-channel attack
that infers user prompt topics from encrypted LLM traffic by analyzing packet
size and timing patterns in streaming responses. Despite TLS encryption
protecting content, these metadata patterns leak sufficient information to
enable topic classification. We demonstrat...
📄 Black-Box Membership Inference Attack for LVLMs via Prior Knowledge-Calibrated Memory Probing
2025-11-06Авторы:
Jinhua Yin, Peiru Yang, Chen Yang, Huili Wang, Zhiyang Hu, Shangguang Wang, Yongfeng Huang, Tao Qi
Саммари на русском не найдено
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Доступные поля: ['id', 'arxiv_id', 'title', 'authors', 'abstract', 'summary_ru', 'categories', 'published_date', 'created_at']
Annotation:
Large vision-language models (LVLMs) derive their capabilities from extensive
training on vast corpora of visual and textual data. Empowered by large-scale
parameters, these models often exhibit strong memorization of their training
data, rendering them susceptible to membership inference attacks (MIAs).
Existing MIA methods for LVLMs typically operate under white- or gray-box
assumptions, by extracting likelihood-based features for the suspected data
samples based on the target LVLMs. However, ...
Показано 121 -
130
из 470 записей