$p^2$RAG: Privacy-Preserving RAG Service Supporting Arbitrary Top-$k$ Retrieval Authors: Yulong Ming, Mingyue Wang, Jijia Yang, Cong Wang, Xiaohua Jia | Published: 2026-03-16 2026.03.16 2026.03.25 Literature Database
Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12 2026.03.12 2026.03.14 Literature Database
Understanding LLM Behavior When Encountering User-Supplied Harmful Content in Harmless Tasks Authors: Junjie Chu, Yiting Qu, Ye Leng, Michael Backes, Yun Shen, Savvas Zannettou, Yang Zhang | Published: 2026-03-12 2026.03.12 2026.03.14 Literature Database
Exponential-Family Membership Inference: From LiRA and RMIA to BaVarIA Authors: Rickard Brännvall | Published: 2026-03-12 2026.03.12 2026.03.14 Literature Database
Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats Authors: Xinhao Deng, Yixiang Zhang, Jiaqing Wu, Jiaqi Bai, Sibo Yi, Zhuoheng Zou, Yue Xiao, Rennai Qiu, Jianan Ma, Jialuo Chen, Xiaohu Du, Xiaofang Yang, Shiwen Cui, Changhua Meng, Weiqiang Wang, Jiaxing Song, Ke Xu, Qi Li | Published: 2026-03-12 2026.03.12 2026.03.14 Literature Database
KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation Authors: Qizhi Chen, Chao Qi, Yihong Huang, Muquan Li, Rongzheng Wang, Dongyang Zhang, Ke Qin, Shuang Liang | Published: 2026-03-12 2026.03.12 2026.03.14 Literature Database
TOSSS: a CVE-based Software Security Benchmark for Large Language Models Authors: Marc Damie, Murat Bilgehan Ertan, Domenico Essoussi, Angela Makhanu, Gaëtan Peter, Roos Wensveen | Published: 2026-03-11 2026.03.11 2026.03.13 Literature Database
Incremental Federated Learning for Intrusion Detection in IoT Networks under Evolving Threat Landscape Authors: Muaan Ur Rehman, Hayretdin Bahs, Rajesh Kalakoti | Published: 2026-03-11 2026.03.11 2026.03.13 Literature Database
CacheSolidarity: Preventing Prefix Caching Side Channels in Multi-tenant LLM Serving Systems Authors: Panagiotis Georgios Pennas, Konstantinos Papaioannou, Marco Guarnieri, Thaleia Dimitra Doudali | Published: 2026-03-11 2026.03.11 2026.03.13 Literature Database
Detecting and Eliminating Neural Network Backdoors Through Active Paths with Application to Intrusion Detection Authors: Eirik Høyheim, Magnus Wiik Eckhoff, Gudmund Grov, Robert Flood, David Aspinall | Published: 2026-03-11 2026.03.11 2026.03.13 Literature Database