Cachemir: Fully Homomorphic Encrypted Inference of Generative Large Language Model with KV Cache Authors: Ye Yu, Yifan Zhou, Yi Chen, Pedro Soto, Wenjie Xiong, Meng Li | Published: 2026-02-12 AlgorithmModel DoSDifferential Privacy 2026.02.12 2026.02.14 Literature Database
Towards Explainable Federated Learning: Understanding the Impact of Differential Privacy Authors: Júlio Oliveira, Rodrigo Ferreira, André Riker, Glaucio H. S. Carvalho, Eirini Eleni Tsilopoulou | Published: 2026-02-10 Privacy AssuranceDifferential PrivacyFederated Learning 2026.02.10 2026.02.12 Literature Database
CAPID: Context-Aware PII Detection for Question-Answering Systems Authors: Mariia Ponomarenko, Sepideh Abedini, Masoumeh Shafieinejad, D. B. Emerson, Shubhankar Mohapatra, Xi He | Published: 2026-02-10 Indirect Prompt Injectionデータ流出に関する分析手法Privacy Assurance 2026.02.10 2026.02.12 Literature Database
Focus Session: LLM4PQC — An Agentic Framework for Accurate and Efficient Synthesis of PQC Cores Authors: Buddhi Perera, Zeng Wang, Weihua Xiao, Mohammed Nabeel, Ozgur Sinanoglu, Johann Knechtel, Ramesh Karri | Published: 2026-02-10 LLM Performance EvaluationHardware AcceleratorPrompt leaking 2026.02.10 2026.02.12 Literature Database
QRS: A Rule-Synthesizing Neuro-Symbolic Triad for Autonomous Vulnerability Discovery Authors: George Tsigkourakos, Constantinos Patsakis | Published: 2026-02-10 データ流出に関する分析手法Vulnerability Analysis脆弱性検出手法 2026.02.10 2026.02.12 Literature Database
LLM-FS: Zero-Shot Feature Selection for Effective and Interpretable Malware Detection Authors: Naveen Gill, Ajvad Haneef K, Madhu Kumar S D | Published: 2026-02-10 Prompt InjectionModel Selection Methodevaluation metrics 2026.02.10 2026.02.12 Literature Database
Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10 Indirect Prompt InjectionPrompt InjectionVulnerability Analysis 2026.02.10 2026.02.12 Literature Database
When Handshakes Tell the Truth: Detecting Web Bad Bots via TLS Fingerprints Authors: Ghalia Jarad, Kemal Bicakci | Published: 2026-02-10 TLSフィンガープリントIndirect Prompt InjectionUser Behavior Analysis 2026.02.10 2026.02.12 Literature Database
ReSIM: Re-ranking Binary Similarity Embeddings to Improve Function Search Performance Authors: Gianluca Capozzi, Anna Paola Giancaspro, Fabio Petroni, Leonardo Querzoni, Giuseppe Antonio Di Luna | Published: 2026-02-10 Model DesignComputational Efficiencyevaluation metrics 2026.02.10 2026.02.12 Literature Database
A Behavioral Fingerprint for Large Language Models: Provenance Tracking via Refusal Vectors Authors: Zhenyu Xu, Victor S. Sheng | Published: 2026-02-10 Disabling Safety Mechanisms of LLMLLM Performance Evaluationevaluation metrics 2026.02.10 2026.02.12 Literature Database