Obscure but Effective: Classical Chinese Jailbreak Prompt Optimization via Bio-Inspired Search Authors: Xun Huang, Simeng Qin, Xiaoshuang Jia, Ranjie Duan, Huanqian Yan, Zhitao Zeng, Fei Yang, Yang Liu, Xiaojun Jia | Published: 2026-02-26 Prompt InjectionLarge Language Model脱獄手法 2026.02.26 2026.02.28 Literature Database
AgentSentry: Mitigating Indirect Prompt Injection in LLM Agents via Temporal Causal Diagnostics and Context Purification Authors: Tian Zhang, Yiwei Xu, Juan Wang, Keyan Guo, Xiaoyang Xu, Bowen Xiao, Quanlong Guan, Jinlin Fan, Jiawei Liu, Zhiquan Liu, Hongxin Hu | Published: 2026-02-26 Indirect Prompt InjectionCounterfactual ExplanationData Management System 2026.02.26 2026.02.28 Literature Database
IMMACULATE: A Practical LLM Auditing Framework via Verifiable Computation Authors: Yanpei Guo, Wenjie Qu, Linyu Wu, Shengfang Zhai, Lionel Z. Wang, Ming Xu, Yue Liu, Binhang Yuan, Dawn Song, Jiaheng Zhang | Published: 2026-02-26 LLM Performance EvaluationModel evaluation methods監査手法 2026.02.26 2026.02.28 Literature Database
Layer-Targeted Multilingual Knowledge Erasure in Large Language Models Authors: Taoran Li, Varun Chandrasekaran, Zhiyuan Yu | Published: 2026-02-26 AlignmentMachine learningMachine Learning Method 2026.02.26 2026.02.28 Literature Database
APFuzz: Towards Automatic Greybox Protocol Fuzzing Authors: Yu Wang, Yang Xiang, Chandra Thapa, Hajime Suzuki | Published: 2026-02-25 プロトコルファジングPrompt InjectionResearch Methodology 2026.02.25 2026.02.27 Literature Database
Private and Robust Contribution Evaluation in Federated Learning Authors: Delio Jaramillo Velez, Gergely Biczok, Alexandre Graell i Amat, Johan Ostman, Balazs Pejo | Published: 2026-02-25 Privacy Assessment貢献評価手法Federated Learning 2026.02.25 2026.02.27 Literature Database
Breaking Semantic-Aware Watermarks via LLM-Guided Coherence-Preserving Semantic Injection Authors: Zheng Gao, Xiaoyu Li, Zhicheng Bao, Xiaoyan Feng, Jiaojiao Jiang | Published: 2026-02-25 WatermarkingText Generation MethodMachine Learning Technology 2026.02.25 2026.02.27 Literature Database
The LLMbda Calculus: AI Agents, Conversations, and Information Flow Authors: Zac Garby, Andrew D. Gordon, David Sands | Published: 2026-02-23 Indirect Prompt InjectionSecurity Analysis MethodData Flow Analysis 2026.02.23 2026.02.25 Literature Database
Can You Tell It’s AI? Human Perception of Synthetic Voices in Vishing Scenarios Authors: Zoha Hayat Bhatti, Bakhtawar Ahtisham, Seemal Tausif, Niklas George, Nida ul Habib Bajwa, Mobin Javed | Published: 2026-02-23 Phishing認知バイアス音声データ処理システム 2026.02.23 2026.02.25 Literature Database
RobPI: Robust Private Inference against Malicious Client Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23 Model Extraction AttackAdversarial LearningDefense Mechanism 2026.02.23 2026.02.25 Literature Database