Hardware-Triggered Backdoors Authors: Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck | Published: 2026-01-29 2026.01.29 文献データベース
LoRA and Privacy: When Random Projections Help (and When They Don’t) Authors: Yaxi Hu, Johanna Düngler, Bernhard Schölkopf, Amartya Sanyal | Published: 2026-01-29 2026.01.29 文献データベース
FIT: Defying Catastrophic Forgetting in Continual LLM Unlearning Authors: Xiaoyu Xu, Minxin Du, Kun Fang, Zi Liang, Yaxin Xiao, Zhicong Huang, Cheng Hong, Qingqing Ye, Haibo Hu | Published: 2026-01-29 2026.01.29 文献データベース
ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses Authors: Ningyuan He, Ronghong Huang, Qianqian Tang, Hongyu Wang, Xianghang Mi, Shanqing Guo | Published: 2026-01-29 2026.01.29 文献データベース
Towards Zero Rotation and Beyond: Architecting Neural Networks for Fast Secure Inference with Homomorphic Encryption Authors: Yifei Cai, Yizhou Feng, Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2026-01-29 2026.01.29 文献データベース
User-Centric Phishing Detection: A RAG and LLM-Based Approach Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29 2026.01.29 文献データベース
Adaptive and Robust Cost-Aware Proof of Quality for Decentralized LLM Inference Networks Authors: Arther Tian, Alex Ding, Frank Chen, Simon Wu, Aaron Chan | Published: 2026-01-29 2026.01.29 文献データベース
IoT Device Identification with Machine Learning: Common Pitfalls and Best Practices Authors: Kahraman Kostas, Rabia Yasa Kostas | Published: 2026-01-28 2026.01.28 文献データベース
Eliciting Least-to-Most Reasoning for Phishing URL Detection Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28 2026.01.28 文献データベース
GAVEL: Towards rule-based safety through activation monitoring Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27 2026.01.27 文献データベース