HoneyTrap: Deceiving Large Language Model Attackers to Honeypot Traps with Resilient Multi-Agent Defense Authors: Siyuan Li, Xi Lin, Jun Wu, Zehao Liu, Haoyu Li, Tianjie Ju, Xiang Chen, Jianhua Li | Published: 2026-01-07 2026.01.07 2026.01.09 Literature Database
SoK: Privacy Risks and Mitigations in Retrieval-Augmented Generation Systems Authors: Andreea-Elena Bodea, Stephen Meisenbacher, Alexandra Klymenko, Florian Matthes | Published: 2026-01-07 2026.01.07 2026.01.09 Literature Database
Jailbreaking LLMs & VLMs: Mechanisms, Evaluation, and Unified Defense Authors: Zejian Chen, Chaozhuo Li, Chao Li, Xi Zhang, Litian Zhang, Yiming He | Published: 2026-01-07 2026.01.07 2026.01.09 Literature Database
Full-Stack Knowledge Graph and LLM Framework for Post-Quantum Cyber Readiness Authors: Rasmus Erlemann, Charles Colyer Morris, Sanjyot Sathe | Published: 2026-01-07 2026.01.07 2026.01.09 Literature Database
SLIM: Stealthy Low-Coverage Black-Box Watermarking via Latent-Space Confusion Zones Authors: Hengyu Wu, Yang Cao | Published: 2026-01-06 2026.01.06 2026.01.08 Literature Database
LLMs, You Can Evaluate It! Design of Multi-perspective Report Evaluation for Security Operation Centers Authors: Hiroyuki Okada, Tatsumi Oba, Naoto Yanai | Published: 2026-01-06 2026.01.06 2026.01.08 Literature Database
JPU: Bridging Jailbreak Defense and Unlearning via On-Policy Path Rectification Authors: Xi Wang, Songlei Jian, Shasha Li, Xiaopeng Li, Zhaoye Li, Bin Ji, Baosheng Wang, Jie Yu | Published: 2026-01-06 2026.01.06 2026.01.08 Literature Database
Window-based Membership Inference Attacks Against Fine-tuned Large Language Models Authors: Yuetian Chen, Yuntao Du, Kaiyuan Zhang, Ashish Kundu, Charles Fleming, Bruno Ribeiro, Ninghui Li | Published: 2026-01-06 2026.01.06 2026.01.08 Literature Database
Adversarial Contrastive Learning for LLM Quantization Attacks Authors: Dinghong Song, Zhiwei Xu, Hai Wan, Xibin Zhao, Pengfei Su, Dong Li | Published: 2026-01-06 2026.01.06 2026.01.08 Literature Database
LAsset: An LLM-assisted Security Asset Identification Framework for System-on-Chip (SoC) Verification Authors: Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan, Nashmin Alam, Azim Uddin, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-01-06 2026.01.06 2026.01.08 Literature Database