Q-ShiftDP: A Differentially Private Parameter-Shift Rule for Quantum Machine Learning Authors: Hoang M. Ngo, Nhat Hoang-Xuan, Quan Nguyen, Nguyen Do, Incheol Shin, My T. Thai | Published: 2026-02-03 Privacy protection frameworkStatistical TestingQuantization and Privacy 2026.02.03 2026.02.05 Literature Database
David vs. Goliath: Verifiable Agent-to-Agent Jailbreaking via Reinforcement Learning Authors: Samuel Nellessen, Tal Kachman | Published: 2026-02-02 Indirect Prompt Injectionマルチターン攻撃分析Reinforcement Learning Attack 2026.02.02 2026.02.04 Literature Database
Guaranteeing Privacy in Hybrid Quantum Learning through Theoretical Mechanisms Authors: Hoang M. Ngo, Tre' R. Jeter, Incheol Shin, Wanli Xing, Tamer Kahveci, My T. Thai | Published: 2026-02-02 Privacy protection frameworkDifferential PrivacyQuantization and Privacy 2026.02.02 2026.02.04 Literature Database
Malware Detection Through Memory Analysis Authors: Sarah Nassar | Published: 2026-02-02 Backdoor DetectionFeature Engineering評価メトリクス 2026.02.02 2026.02.04 Literature Database
Co-RedTeam: Orchestrated Security Discovery and Exploitation with LLM Agents Authors: Pengfei He, Ash Fox, Lesly Miculicich, Stefan Friedli, Daniel Fabian, Burak Gokturk, Jiliang Tang, Chen-Yu Lee, Tomas Pfister, Long T. Le | Published: 2026-02-02 Security of Code GenerationSecurity label脆弱性評価 2026.02.02 2026.02.04 Literature Database
Human Society-Inspired Approaches to Agentic AI Security: The 4C Framework Authors: Alsharif Abuadbba, Nazatul Sultan, Surya Nepal, Sanjay Jha | Published: 2026-02-02 Relationship of AI SystemsSecurity labelFramework 2026.02.02 2026.02.04 Literature Database
RedVisor: Reasoning-Aware Prompt Injection Defense via Zero-Copy KV Cache Reuse Authors: Mingrui Liu, Sixiao Zhang, Cheng Long, Kwok-Yan Lam | Published: 2026-02-02 FrameworkPrompt Injection防御手法の統合 2026.02.02 2026.02.04 Literature Database
WorldCup Sampling for Multi-bit LLM Watermarking Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02 LLM Performance EvaluationAlgorithm DesignWatermarking 2026.02.02 2026.02.04 Literature Database
AI-Assisted Adaptive Rendering for High-Frequency Security Telemetry in Web Interfaces Authors: Mona Rajhans | Published: 2026-02-02 User Activity AnalysisMachine Learning FrameworkAdaptive Misuse Detection 2026.02.02 2026.02.04 Literature Database
Efficient Softmax Reformulation for Homomorphic Encryption via Moment Generating Function Authors: Hanjun Park, Byeong-Seo Min, Jiheon Woo, Min-Wook Jeong, Jongho Shin, Yongwoo Lee, Young-Sik Kim, Yongjune Kim | Published: 2026-02-02 Algorithm DesignEncryption Technology評価基準 2026.02.02 2026.02.04 Literature Database