RedVisor: Reasoning-Aware Prompt Injection Defense via Zero-Copy KV Cache Reuse Authors: Mingrui Liu, Sixiao Zhang, Cheng Long, Kwok-Yan Lam | Published: 2026-02-02 FrameworkPrompt Injection防御手法の統合 2026.02.02 2026.02.04 Literature Database
WorldCup Sampling for Multi-bit LLM Watermarking Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02 LLM Performance EvaluationAlgorithm DesignWatermarking 2026.02.02 2026.02.04 Literature Database
AI-Assisted Adaptive Rendering for High-Frequency Security Telemetry in Web Interfaces Authors: Mona Rajhans | Published: 2026-02-02 User Activity AnalysisMachine Learning FrameworkAdaptive Misuse Detection 2026.02.02 2026.02.04 Literature Database
Efficient Softmax Reformulation for Homomorphic Encryption via Moment Generating Function Authors: Hanjun Park, Byeong-Seo Min, Jiheon Woo, Min-Wook Jeong, Jongho Shin, Yongwoo Lee, Young-Sik Kim, Yongjune Kim | Published: 2026-02-02 Algorithm DesignEncryption Technology評価基準 2026.02.02 2026.02.04 Literature Database
Hardware-Triggered Backdoors Authors: Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck | Published: 2026-01-29 ハードウェアトリガー型バックドアBackdoor Attack数値的偏差 2026.01.29 2026.01.31 Literature Database
LoRA and Privacy: When Random Projections Help (and When They Don’t) Authors: Yaxi Hu, Johanna Düngler, Bernhard Schölkopf, Amartya Sanyal | Published: 2026-01-29 Privacy protection frameworkMembership InferenceDifferential Privacy 2026.01.29 2026.01.31 Literature Database
FIT: Defying Catastrophic Forgetting in Continual LLM Unlearning Authors: Xiaoyu Xu, Minxin Du, Kun Fang, Zi Liang, Yaxin Xiao, Zhicong Huang, Cheng Hong, Qingqing Ye, Haibo Hu | Published: 2026-01-29 RobustnessMachine Unlearningevaluation metrics 2026.01.29 2026.01.31 Literature Database
ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses Authors: Ningyuan He, Ronghong Huang, Qianqian Tang, Hongyu Wang, Xianghang Mi, Shanqing Guo | Published: 2026-01-29 データ毒性攻撃Prompt leakingModel Extraction Attack 2026.01.29 2026.01.31 Literature Database
Towards Zero Rotation and Beyond: Architecting Neural Networks for Fast Secure Inference with Homomorphic Encryption Authors: Yifei Cai, Yizhou Feng, Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2026-01-29 Algorithm DesignTrigger DetectionEncryption Technology 2026.01.29 2026.01.31 Literature Database
User-Centric Phishing Detection: A RAG and LLM-Based Approach Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29 LLM Performance EvaluationPoisoning attack on RAGユーザー中心のフィッシング検出 2026.01.29 2026.01.31 Literature Database