Differentially Private Retrieval-Augmented Generation Authors: Tingting Tang, James Flemings, Yongqin Wang, Murali Annavaram | Published: 2026-02-16 2026.02.16 2026.02.18 Literature Database
Unknown Attack Detection in IoT Networks using Large Language Models: A Robust, Data-efficient Approach Authors: Shan Ali, Feifei Niu, Paria Shirani, Lionel C. Briand | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database
BlackCATT: Black-box Collusion Aware Traitor Tracing in Federated Learning Authors: Elena Rodríguez-Lois, Fabio Brau, Maura Pintor, Battista Biggio, Fernando Pérez-González | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database
DeepSight: An All-in-One LM Safety Toolkit Authors: Bo Zhang, Jiaxuan Guo, Lijun Li, Dongrui Liu, Sujin Chen, Guanxu Chen, Zhijie Zheng, Qihao Lin, Lewen Yan, Chen Qian, Yijin Zhou, Yuyao Wu, Shaoxiong Guo, Tianyi Du, Jingyi Yang, Xuhao Hu, Ziqi Miao, Xiaoya Lu, Jing Shao, Xia Hu | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database
PAC to the Future: Zero-Knowledge Proofs of PAC Private Systems Authors: Guilhem Repetto, Nojan Sheybani, Gabrielle De Micheli, Farinaz Koushanfar | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database
More Haste, Less Speed: Weaker Single-Layer Watermark Improves Distortion-Free Watermark Ensembles Authors: Ruibo Chen, Yihan Wu, Xuehao Cui, Jingqi Zhang, Heng Huang | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database
LoRA-based Parameter-Efficient LLMs for Continuous Learning in Edge-based Malware Detection Authors: Christian Rondanini, Barbara Carminati, Elena Ferrari, Niccolò Lardo, Ashish Kundu | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database
Stop Tracking Me! Proactive Defense Against Attribute Inference Attack in LLMs Authors: Dong Yan, Jian Liang, Ran He, Tieniu Tan | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database
Differentially Private and Communication Efficient Large Language Model Split Inference via Stochastic Quantization and Soft Prompt Authors: Yujie Gu, Richeng Jin, Xiaoyu Ji, Yier Jin, Wenyuan Xu | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database
Jailbreaking Leaves a Trace: Understanding and Detecting Jailbreak Attacks from Internal Representations of Large Language Models Authors: Sri Durga Sai Sowmya Kadali, Evangelos E. Papalexakis | Published: 2026-02-12 2026.02.12 2026.02.14 Literature Database