Comparative Insights on Adversarial Machine Learning from Industry and Academia: A User-Study Approach Authors: Vishruti Kakkad, Paul Chung, Hanan Hibshi, Maverick Woo | Published: 2026-02-04 2026.02.04 文献データベース
How Few-shot Demonstrations Affect Prompt-based Defenses Against LLM Jailbreak Attacks Authors: Yanshu Wang, Shuaishuai Yang, Jingjing He, Tong Yang | Published: 2026-02-04 2026.02.04 文献データベース
Semantic Consensus Decoding: Backdoor Defense for Verilog Code Generation Authors: Guang Yang, Xing Hu, Xiang Chen, Xin Xia | Published: 2026-02-04 2026.02.04 文献データベース
Attack-Resistant Uniform Fairness for Linear and Smooth Contextual Bandits Authors: Qingwen Zhang, Wenjia Wang | Published: 2026-02-04 2026.02.04 文献データベース
Don’t believe everything you read: Understanding and Measuring MCP Behavior under Misleading Tool Descriptions Authors: Zhihao Li, Boyang Ma, Xuelong Dai, Minghui Xu, Yue Zhang, Biwei Yan, Kun Li | Published: 2026-02-03 2026.02.03 文献データベース
Detecting and Explaining Malware Family Evolution Using Rule-Based Drift Analysis Authors: Olha Jurečková, Martin Jureček | Published: 2026-02-03 2026.02.03 文献データベース
LogicScan: An LLM-driven Framework for Detecting Business Logic Vulnerabilities in Smart Contracts Authors: Jiaqi Gao, Zijian Zhang, Yuqiang Sun, Ye Liu, Chengwei Liu, Han Liu, Yi Li, Yang Liu | Published: 2026-02-03 2026.02.03 文献データベース
Generalizable and Interpretable RF Fingerprinting with Shapelet-Enhanced Large Language Models Authors: Tianya Zhao, Junqing Zhang, Haowen Xu, Xiaoyan Sun, Jun Dai, Xuyu Wang | Published: 2026-02-03 2026.02.03 文献データベース
Q-ShiftDP: A Differentially Private Parameter-Shift Rule for Quantum Machine Learning Authors: Hoang M. Ngo, Nhat Hoang-Xuan, Quan Nguyen, Nguyen Do, Incheol Shin, My T. Thai | Published: 2026-02-03 2026.02.03 文献データベース
David vs. Goliath: Verifiable Agent-to-Agent Jailbreaking via Reinforcement Learning Authors: Samuel Nellessen, Tal Kachman | Published: 2026-02-02 2026.02.02 文献データベース