Identifying AI Web Scrapers Using Canary Tokens Authors: Steven Seiden, Triss Ren, Caroline Zhang, Taein Kim, Enze Liu, Emily Wenger | Published: 2026-05-13 2026.05.13 2026.05.15 Literature Database
Model-Agnostic Lifelong LLM Safety via Externalized Attack-Defense Co-Evolution Authors: Xiaozhe Zhang, Chaozhuo Li, Hui Liu, Shaocheng Yan, Bingyu Yan, Qiwei Ye, Haoliang Li | Published: 2026-05-13 2026.05.13 2026.05.15 Literature Database
Empowering IoT Security: On-Device Intrusion Detection in Resource Constrained Devices Authors: Vasilis Ieropoulos, Eirini Anthi, Theodoros Spyridopoulos, Pete Burnap, Aftab Khan, Pietro Carnelli | Published: 2026-05-13 2026.05.13 2026.05.15 Literature Database
Quantifying LLM Safety Degradation Under Repeated Attacks Using Survival Analysis Authors: Zvi Topol | Published: 2026-05-13 2026.05.13 2026.05.15 Literature Database
Persona-Model Collapse in Emergent Misalignment Authors: Davi Bastos Costa, Renato Vicente | Published: 2026-05-13 2026.05.13 2026.05.15 Literature Database
HE-PIM: Demystifying Homomorphic Operations on a Real-world Processing-in-Memory System Authors: Harshita Gupta, Mayank Kabra, Jaewoo Park, Priyam Mehta, Phillip Widdowson, Tathagata Barik, Nisa Bostancı, Konstantinos Kanellopoulos, Juan Gómez-Luna, Antonio J. Peña, Mohammad Sadrosadati, Onur Mutlu | Published: 2026-05-13 2026.05.13 2026.05.15 Literature Database
SoK: Unlearnability and Unlearning for Model Dememorization Authors: Mengying Zhang, Derui Wang, Ruoxi Sun, Xiaoyu Xia, Shuang Hao, Minhui Xue | Published: 2026-05-12 2026.05.12 2026.05.14 Literature Database
FlowSteer: Prompt-Only Workflow Steering Exposes Planning-Time Vulnerabilities in Multi-Agent LLM Systems Authors: Fanxiao Li, Jiaying Wu, Tingchao Fu, Natasha Jaques, Wei Zhou, Min-Yen Kan | Published: 2026-05-12 2026.05.12 2026.05.14 Literature Database
CTFusion: A CTF-based Benchmark for LLM Agent Evaluation Authors: Dongjun Lee, Ga-eun Bae, Insu Yun | Published: 2026-05-12 2026.05.12 2026.05.14 Literature Database
Can a Single Message Paralyze the AI Infrastructure? The Rise of AbO-DDoS Attacks through Targeted Mobius Injection Authors: Zi Liang, Ronghua Li, Yanyun Wang, Qingqing Ye, Haibo Hu | Published: 2026-05-12 2026.05.12 2026.05.14 Literature Database