AIセキュリティポータルbot

Cachemir: Fully Homomorphic Encrypted Inference of Generative Large Language Model with KV Cache

Authors: Ye Yu, Yifan Zhou, Yi Chen, Pedro Soto, Wenjie Xiong, Meng Li | Published: 2026-02-12
Algorithm
Model DoS
Differential Privacy

Towards Explainable Federated Learning: Understanding the Impact of Differential Privacy

Authors: Júlio Oliveira, Rodrigo Ferreira, André Riker, Glaucio H. S. Carvalho, Eirini Eleni Tsilopoulou | Published: 2026-02-10
Privacy Assurance
Differential Privacy
Federated Learning

CAPID: Context-Aware PII Detection for Question-Answering Systems

Authors: Mariia Ponomarenko, Sepideh Abedini, Masoumeh Shafieinejad, D. B. Emerson, Shubhankar Mohapatra, Xi He | Published: 2026-02-10
Indirect Prompt Injection
データ流出に関する分析手法
Privacy Assurance

Focus Session: LLM4PQC — An Agentic Framework for Accurate and Efficient Synthesis of PQC Cores

Authors: Buddhi Perera, Zeng Wang, Weihua Xiao, Mohammed Nabeel, Ozgur Sinanoglu, Johann Knechtel, Ramesh Karri | Published: 2026-02-10
LLM Performance Evaluation
Hardware Accelerator
Prompt leaking

QRS: A Rule-Synthesizing Neuro-Symbolic Triad for Autonomous Vulnerability Discovery

Authors: George Tsigkourakos, Constantinos Patsakis | Published: 2026-02-10
データ流出に関する分析手法
Vulnerability Analysis
脆弱性検出手法

LLM-FS: Zero-Shot Feature Selection for Effective and Interpretable Malware Detection

Authors: Naveen Gill, Ajvad Haneef K, Madhu Kumar S D | Published: 2026-02-10
Prompt Injection
Model Selection Method
evaluation metrics

Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks

Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10
Indirect Prompt Injection
Prompt Injection
Vulnerability Analysis

When Handshakes Tell the Truth: Detecting Web Bad Bots via TLS Fingerprints

Authors: Ghalia Jarad, Kemal Bicakci | Published: 2026-02-10
TLSフィンガープリント
Indirect Prompt Injection
User Behavior Analysis

ReSIM: Re-ranking Binary Similarity Embeddings to Improve Function Search Performance

Authors: Gianluca Capozzi, Anna Paola Giancaspro, Fabio Petroni, Leonardo Querzoni, Giuseppe Antonio Di Luna | Published: 2026-02-10
Model Design
Computational Efficiency
evaluation metrics

A Behavioral Fingerprint for Large Language Models: Provenance Tracking via Refusal Vectors

Authors: Zhenyu Xu, Victor S. Sheng | Published: 2026-02-10
Disabling Safety Mechanisms of LLM
LLM Performance Evaluation
evaluation metrics