Unveiling the Resilience of LLM-Enhanced Search Engines against Black-Hat SEO Manipulation Authors: Pei Chen, Geng Hong, Xinyi Wu, Mengying Wu, Zixuan Zhu, Mingxuan Liu, Baojun Liu, Mi Zhang, Min Yang | Published: 2026-03-26 Prompt leakingModel Extraction AttackLarge Language Model 2026.03.26 2026.03.28 Literature Database
Beyond Content Safety: Real-Time Monitoring for Reasoning Vulnerabilities in Large Language Models Authors: Xunguang Wang, Yuguang Zhou, Qingyue Wang, Zongjie Li, Ruixuan Huang, Zhenlan Ji, Pingchuan Ma, Shuai Wang | Published: 2026-03-26 Indirect Prompt InjectionPrompt leakingLarge Language Model 2026.03.26 2026.03.28 Literature Database
ALPS: Automated Least-Privilege Enforcement for Securing Serverless Functions Authors: Changhee Shin, Bom Kim, Seungsoo Lee | Published: 2026-03-26 セキュリティアライメントData Extraction and Analysis動的ポリシー適応 2026.03.26 2026.03.28 Literature Database
On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor Threats Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26 データ毒性Backdoor AttackAttackers and Malicious Devices 2026.03.26 2026.03.28 Literature Database
Physical Backdoor Attack Against Deep Learning-Based Modulation Classification Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26 データ毒性Backdoor DetectionBackdoor Attack 2026.03.26 2026.03.28 Literature Database
Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26 Proactive DefenseAttackers and Malicious Devices評価メトリクス 2026.03.26 2026.03.28 Literature Database
Attack Assessment and Augmented Identity Recognition for Human Skeleton Data Authors: Joseph G. Zalameda, Megan A. Witherow, Alexander M. Glandon, Jose Aguilera, Khan M. Iftekharuddin | Published: 2026-03-25 Data GenerationRobustness Improvement MethodAdversarial Learning 2026.03.25 2026.03.26 Literature Database
Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search Authors: Yulin Shen, Xudong Pan, Geng Hong, Min Yang | Published: 2026-03-25 Phishing AttackPrompt InjectionAttackers and Malicious Devices 2026.03.25 2026.03.26 Literature Database
Walma: Learning to See Memory Corruption in WebAssembly Authors: Oussama Draissi, Mark Günzel, Ahmad-Reza Sadeghi, Lucas Davi | Published: 2026-03-25 Data Generation脆弱性検出手法評価基準 2026.03.25 2026.03.26 Literature Database
Toward a Multi-Layer ML-Based Security Framework for Industrial IoT Authors: Aymen Bouferroum, Valeria Loscri, Abderrahim Benslimane | Published: 2026-03-25 IoT Security FrameworkAttackers and Malicious Devices評価基準 2026.03.25 2026.03.26 Literature Database