Literature Database

文献データベースでは、AIセキュリティに関する文献情報を分類・集約しています。詳しくは文献データベースについてをご覧ください。統計情報のページでは、収集された文献に関する統計情報を公開しています。
The Literature Database categorizes and aggregates literature related to AI security. For more details, please see About Literature Database. We provide statistical information regarding the Literature Database on the Statistics page.

MetaBackdoor: Exploiting Positional Encoding as a Backdoor Attack Surface in LLMs

Authors: Rui Wen, Mark Russinovich, Andrew Paverd, Jun Sakuma, Ahmed Salem | Published: 2026-05-14
LLM Security
Data Leakage
Backdoor Detection

PickleFuzzer: A Case Study in Fuzzing for Discrepancies Between Python Pickle Implementations

Authors: Justin Applegate, Andreas Kellas | Published: 2026-05-14
データオブジェクト
Data Protection Method
Watermark Design

Toward Securing AI Agents Like Operating Systems

Authors: Lukas Pirch, Micha Horlboge, Patrick Großmann, Syeda Mahnur Asif, Klim Kireev, Thorsten Holz, Konrad Rieck | Published: 2026-05-14
LLM Security
Indirect Prompt Injection
Data Protection Method

EVA: Editing for Versatile Alignment against Jailbreaks

Authors: Yi Wang, Hongye Qiu, Yue Xu, Sibei Yang, Zhan Qin, Minlie Huang, Wenjie Wang | Published: 2026-05-14
LLM Security
Model DoS
安全性に関連するマルチモーダルなアプローチ

Defenses at Odds: Measuring and Explaining Defense Conflicts in Large Language Models

Authors: Xiangtao Meng, Wenyu Chen, Chuanchao Zang, Xinyu Gao, Jianing Wang, Li Wang, Zheng Li, Shanqing Guo | Published: 2026-05-14
Bias Detection in AI Output
Data Protection Method
Model DoS

Exploiting LLM Agent Supply Chains via Payload-less Skills

Authors: Xinyu Liu, Yukai Zhao, Xing Hu, Xin Xia | Published: 2026-05-14
LLM Security
Indirect Prompt Injection
Attack Method

Watermarking Game-Playing Agents in Perfect-Information Extensive-Form Games

Authors: Juho Kim, Fei Fang, Tuomas Sandholm | Published: 2026-05-14
Digital Watermarking for Generative AI
Behavior Analysis Method
Watermark Design

Identifying AI Web Scrapers Using Canary Tokens

Authors: Steven Seiden, Triss Ren, Caroline Zhang, Taein Kim, Enze Liu, Emily Wenger | Published: 2026-05-13
LLM Security
Data Extraction and Analysis
User Behavior Analysis

Model-Agnostic Lifelong LLM Safety via Externalized Attack-Defense Co-Evolution

Authors: Xiaozhe Zhang, Chaozhuo Li, Hui Liu, Shaocheng Yan, Bingyu Yan, Qiwei Ye, Haoliang Li | Published: 2026-05-13
Disabling Safety Mechanisms of LLM
Alignment
Behavior Analysis Method

Empowering IoT Security: On-Device Intrusion Detection in Resource Constrained Devices

Authors: Vasilis Ieropoulos, Eirini Anthi, Theodoros Spyridopoulos, Pete Burnap, Aftab Khan, Pietro Carnelli | Published: 2026-05-13
IoT Cybersecurity
Data Protection Method
Machine Learning Application