APFuzz: Towards Automatic Greybox Protocol Fuzzing Authors: Yu Wang, Yang Xiang, Chandra Thapa, Hajime Suzuki | Published: 2026-02-25 プロトコルファジングPrompt InjectionResearch Methodology 2026.02.25 2026.02.27 Literature Database
Private and Robust Contribution Evaluation in Federated Learning Authors: Delio Jaramillo Velez, Gergely Biczok, Alexandre Graell i Amat, Johan Ostman, Balazs Pejo | Published: 2026-02-25 Privacy Assessment貢献評価手法Federated Learning 2026.02.25 2026.02.27 Literature Database
Breaking Semantic-Aware Watermarks via LLM-Guided Coherence-Preserving Semantic Injection Authors: Zheng Gao, Xiaoyu Li, Zhicheng Bao, Xiaoyan Feng, Jiaojiao Jiang | Published: 2026-02-25 WatermarkingText Generation MethodMachine Learning Technology 2026.02.25 2026.02.27 Literature Database
The LLMbda Calculus: AI Agents, Conversations, and Information Flow Authors: Zac Garby, Andrew D. Gordon, David Sands | Published: 2026-02-23 Indirect Prompt InjectionSecurity Analysis MethodData Flow Analysis 2026.02.23 2026.02.25 Literature Database
Can You Tell It’s AI? Human Perception of Synthetic Voices in Vishing Scenarios Authors: Zoha Hayat Bhatti, Bakhtawar Ahtisham, Seemal Tausif, Niklas George, Nida ul Habib Bajwa, Mobin Javed | Published: 2026-02-23 Phishing認知バイアス音声データ処理システム 2026.02.23 2026.02.25 Literature Database
RobPI: Robust Private Inference against Malicious Client Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23 Model Extraction AttackAdversarial LearningDefense Mechanism 2026.02.23 2026.02.25 Literature Database
Dirichlet Scale Mixture Priors for Bayesian Neural Networks Authors: August Arnstad, Leiv Rønneberg, Geir Storvik | Published: 2026-02-23 Model IdentificationResearch MethodologyHigh-Dimensional Data Analysis 2026.02.23 2026.02.25 Literature Database
LLM-enabled Applications Require System-Level Threat Monitoring Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23 Poisoning attack on RAGModel Extraction Attack監視手法 2026.02.23 2026.02.25 Literature Database
An Explainable Memory Forensics Approach for Malware Analysis Authors: Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto | Published: 2026-02-23 Forensic ReportPrompt InjectionMalware Detection Method 2026.02.23 2026.02.25 Literature Database
SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23 Malware DetectionMalware Detection MethodModel Extraction Attack 2026.02.23 2026.02.25 Literature Database