Dirichlet Scale Mixture Priors for Bayesian Neural Networks Authors: August Arnstad, Leiv Rønneberg, Geir Storvik | Published: 2026-02-23 Model IdentificationResearch MethodologyHigh-Dimensional Data Analysis 2026.02.23 2026.02.25 Literature Database
LLM-enabled Applications Require System-Level Threat Monitoring Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23 Poisoning attack on RAGModel Extraction Attack監視手法 2026.02.23 2026.02.25 Literature Database
An Explainable Memory Forensics Approach for Malware Analysis Authors: Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto | Published: 2026-02-23 Forensic ReportPrompt InjectionMalware Detection Method 2026.02.23 2026.02.25 Literature Database
SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23 Malware DetectionMalware Detection MethodModel Extraction Attack 2026.02.23 2026.02.25 Literature Database
Efficient Multi-Party Secure Comparison over Different Domains with Preprocessing Assistance Authors: Kaiwen Wang, Xiaolin Chang, Yuehan Dong, Ruichen Zhang | Published: 2026-02-23 Data PreprocessingSecure Arithmetic ComputationWatermark 2026.02.23 2026.02.25 Literature Database
Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23 Poisoning attack on RAGデータ毒性Vulnerability Analysis 2026.02.23 2026.02.25 Literature Database
Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments Authors: Kunal Mukherjee | Published: 2026-02-23 LLM Performance EvaluationPrompt leakingVulnerability Analysis 2026.02.23 2026.02.25 Literature Database
Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19 Secure Arithmetic ComputationMachine Learning TechnologyWatermark 2026.02.19 2026.02.21 Literature Database
What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else? Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19 Indirect Prompt Injectionセキュリティ課題Prompt Injection 2026.02.19 2026.02.21 Literature Database
Privacy-Preserving Mechanisms Enable Cheap Verifiable Inference of LLMs Authors: Arka Pal, Louai Zahran, William Gvozdjak, Akilesh Potti, Micah Goldblum | Published: 2026-02-19 Privacy Risk ManagementDifferential PrivacyDefense Method 2026.02.19 2026.02.21 Literature Database