AIセキュリティポータルbot

RedVisor: Reasoning-Aware Prompt Injection Defense via Zero-Copy KV Cache Reuse

Authors: Mingrui Liu, Sixiao Zhang, Cheng Long, Kwok-Yan Lam | Published: 2026-02-02
Framework
Prompt Injection
防御手法の統合

WorldCup Sampling for Multi-bit LLM Watermarking

Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02
LLM Performance Evaluation
Algorithm Design
Watermarking

AI-Assisted Adaptive Rendering for High-Frequency Security Telemetry in Web Interfaces

Authors: Mona Rajhans | Published: 2026-02-02
User Activity Analysis
Machine Learning Framework
Adaptive Misuse Detection

Efficient Softmax Reformulation for Homomorphic Encryption via Moment Generating Function

Authors: Hanjun Park, Byeong-Seo Min, Jiheon Woo, Min-Wook Jeong, Jongho Shin, Yongwoo Lee, Young-Sik Kim, Yongjune Kim | Published: 2026-02-02
Algorithm Design
Encryption Technology
評価基準

Hardware-Triggered Backdoors

Authors: Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck | Published: 2026-01-29
ハードウェアトリガー型バックドア
Backdoor Attack
数値的偏差

LoRA and Privacy: When Random Projections Help (and When They Don’t)

Authors: Yaxi Hu, Johanna Düngler, Bernhard Schölkopf, Amartya Sanyal | Published: 2026-01-29
Privacy protection framework
Membership Inference
Differential Privacy

FIT: Defying Catastrophic Forgetting in Continual LLM Unlearning

Authors: Xiaoyu Xu, Minxin Du, Kun Fang, Zi Liang, Yaxin Xiao, Zhicong Huang, Cheng Hong, Qingqing Ye, Haibo Hu | Published: 2026-01-29
Robustness
Machine Unlearning
evaluation metrics

ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses

Authors: Ningyuan He, Ronghong Huang, Qianqian Tang, Hongyu Wang, Xianghang Mi, Shanqing Guo | Published: 2026-01-29
データ毒性攻撃
Prompt leaking
Model Extraction Attack

Towards Zero Rotation and Beyond: Architecting Neural Networks for Fast Secure Inference with Homomorphic Encryption

Authors: Yifei Cai, Yizhou Feng, Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2026-01-29
Algorithm Design
Trigger Detection
Encryption Technology

User-Centric Phishing Detection: A RAG and LLM-Based Approach

Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29
LLM Performance Evaluation
Poisoning attack on RAG
ユーザー中心のフィッシング検出