CIC-Trap4Phish: A Unified Multi-Format Dataset for Phishing and Quishing Attachment Detection Authors: Fatemeh Nejati, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali A. Ghorbani, Sajjad Dadkhah | Published: 2026-02-09 2026.02.09 文献データベース
Is Reasoning Capability Enough for Safety in Long-Context Language Models? Authors: Yu Fu, Haz Sameen Shahgir, Huanli Gong, Zhipeng Wei, N. Benjamin Erichson, Yue Dong | Published: 2026-02-09 2026.02.09 文献データベース
HoGS: Homophily-Oriented Graph Synthesis for Local Differentially Private GNN Training Authors: Wen Xu, Zhetao Li, Yong Xiao, Pengpeng Qiao, Mianxiong Dong, Kaoru Ota | Published: 2026-02-09 2026.02.09 文献データベース
Empirical Evaluation of SMOTE in Android Malware Detection with Machine Learning: Challenges and Performance in CICMalDroid 2020 Authors: Diego Ferreira Duarte, Andre Augusto Bortoli | Published: 2026-02-09 2026.02.09 文献データベース
Large Language Lobotomy: Jailbreaking Mixture-of-Experts via Expert Silencing Authors: Jona te Lintelo, Lichao Wu, Stjepan Picek | Published: 2026-02-09 2026.02.09 文献データベース
Sparse Models, Sparse Safety: Unsafe Routes in Mixture-of-Experts LLMs Authors: Yukun Jiang, Hai Huang, Mingjie Li, Yage Zhang, Michael Backes, Yang Zhang | Published: 2026-02-09 2026.02.09 文献データベース
On Protecting Agentic Systems’ Intellectual Property via Watermarking Authors: Liwen Wang, Zongjie Li, Yuchong Xie, Shuai Wang, Dongdong She, Wei Wang, Juergen Rahmel | Published: 2026-02-09 2026.02.09 文献データベース
Towards Real-World Industrial-Scale Verification: LLM-Driven Theorem Proving on seL4 Authors: Jianyu Zhang, Fuyuan Zhang, Jiayi Lu, Jilin Hu, Xiaoyi Yin, Long Zhang, Feng Yang, Yongwang Zhao | Published: 2026-02-09 2026.02.09 文献データベース
InfiCoEvalChain: A Blockchain-Based Decentralized Framework for Collaborative LLM Evaluation Authors: Yifan Yang, Jinjia Li, Kunxi Li, Puhao Zheng, Yuanyi Wang, Zheyan Qu, Yang Yu, Jianmin Wu, Ming Li, Hongxia Yang | Published: 2026-02-09 2026.02.09 文献データベース
Deep Learning for Contextualized NetFlow-Based Network Intrusion Detection: Methods, Data, Evaluation and Deployment Authors: Abdelkader El Mahdaouy, Issam Ait Yahia, Soufiane Oualil, Ismail Berrada | Published: 2026-02-05 2026.02.05 文献データベース