When Handshakes Tell the Truth: Detecting Web Bad Bots via TLS Fingerprints Authors: Ghalia Jarad, Kemal Bicakci | Published: 2026-02-10 TLSフィンガープリントIndirect Prompt InjectionUser Behavior Analysis 2026.02.10 2026.02.12 Literature Database
ReSIM: Re-ranking Binary Similarity Embeddings to Improve Function Search Performance Authors: Gianluca Capozzi, Anna Paola Giancaspro, Fabio Petroni, Leonardo Querzoni, Giuseppe Antonio Di Luna | Published: 2026-02-10 Model DesignComputational Efficiencyevaluation metrics 2026.02.10 2026.02.12 Literature Database
A Behavioral Fingerprint for Large Language Models: Provenance Tracking via Refusal Vectors Authors: Zhenyu Xu, Victor S. Sheng | Published: 2026-02-10 Disabling Safety Mechanisms of LLMLLM Performance Evaluationevaluation metrics 2026.02.10 2026.02.12 Literature Database
LLMAC: A Global and Explainable Access Control Framework with Large Language Model Authors: Sharif Noor Zisad, Ragib Hasan | Published: 2026-02-10 LLM Performance EvaluationPoisoning attack on RAGアクセス制御モデル 2026.02.10 2026.02.12 Literature Database
CIC-Trap4Phish: A Unified Multi-Format Dataset for Phishing and Quishing Attachment Detection Authors: Fatemeh Nejati, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali A. Ghorbani, Sajjad Dadkhah | Published: 2026-02-09 Phishing DetectionPrompt InjectionFeature Engineering 2026.02.09 2026.02.11 Literature Database
Is Reasoning Capability Enough for Safety in Long-Context Language Models? Authors: Yu Fu, Haz Sameen Shahgir, Huanli Gong, Zhipeng Wei, N. Benjamin Erichson, Yue Dong | Published: 2026-02-09 Hallucination安全性分析推論能力 2026.02.09 2026.02.11 Literature Database
HoGS: Homophily-Oriented Graph Synthesis for Local Differentially Private GNN Training Authors: Wen Xu, Zhetao Li, Yong Xiao, Pengpeng Qiao, Mianxiong Dong, Kaoru Ota | Published: 2026-02-09 Privacy-Preserving AlgorithmModel InversionAdversarial Learning 2026.02.09 2026.02.11 Literature Database
Empirical Evaluation of SMOTE in Android Malware Detection with Machine Learning: Challenges and Performance in CICMalDroid 2020 Authors: Diego Ferreira Duarte, Andre Augusto Bortoli | Published: 2026-02-09 Data PreprocessingImbalanced Dataset機械学習によるマルウェア分類 2026.02.09 2026.02.11 Literature Database
Large Language Lobotomy: Jailbreaking Mixture-of-Experts via Expert Silencing Authors: Jona te Lintelo, Lichao Wu, Stjepan Picek | Published: 2026-02-09 Prompt InjectionLarge Language Model安全性分析 2026.02.09 2026.02.11 Literature Database
Sparse Models, Sparse Safety: Unsafe Routes in Mixture-of-Experts LLMs Authors: Yukun Jiang, Hai Huang, Mingjie Li, Yage Zhang, Michael Backes, Yang Zhang | Published: 2026-02-09 Sparsity DefensePrompt Injection安全性分析 2026.02.09 2026.02.11 Literature Database