LLMs, You Can Evaluate It! Design of Multi-perspective Report Evaluation for Security Operation Centers Authors: Hiroyuki Okada, Tatsumi Oba, Naoto Yanai | Published: 2026-01-06 LLM活用Security Analysis MethodUser Experience Evaluation 2026.01.06 2026.01.08 Literature Database
JPU: Bridging Jailbreak Defense and Unlearning via On-Policy Path Rectification Authors: Xi Wang, Songlei Jian, Shasha Li, Xiaopeng Li, Zhaoye Li, Bin Ji, Baosheng Wang, Jie Yu | Published: 2026-01-06 Prompt InjectionModel Extraction AttackAdversarial Attack Detection 2026.01.06 2026.01.08 Literature Database
Window-based Membership Inference Attacks Against Fine-tuned Large Language Models Authors: Yuetian Chen, Yuntao Du, Kaiyuan Zhang, Ashish Kundu, Charles Fleming, Bruno Ribeiro, Ninghui Li | Published: 2026-01-06 Ensemble LearningPrivacy Enhancing TechnologyMembership Inference 2026.01.06 2026.01.08 Literature Database
Adversarial Contrastive Learning for LLM Quantization Attacks Authors: Dinghong Song, Zhiwei Xu, Hai Wan, Xibin Zhao, Pengfei Su, Dong Li | Published: 2026-01-06 Disabling Safety Mechanisms of LLMModel Extraction AttackQuantization and Privacy 2026.01.06 2026.01.08 Literature Database
LAsset: An LLM-assisted Security Asset Identification Framework for System-on-Chip (SoC) Verification Authors: Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan, Nashmin Alam, Azim Uddin, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-01-06 LLM活用Security Analysis Method脅威モデリング自動化 2026.01.06 2026.01.08 Literature Database
Quantum AI for Cybersecurity: A hybrid Quantum-Classical models for attack path analysis Authors: Jessica A. Sciammarelli, Waqas Ahmed | Published: 2026-01-05 Security Analysis MethodData PreprocessingQuantum Machine Learning 2026.01.05 2026.01.07 Literature Database
UnPII: Unlearning Personally Identifiable Information with Quantifiable Exposure Risk Authors: Intae Jeon, Yujeong Kwon, Hyungjoon Koo | Published: 2026-01-05 Data Selection StrategyPrivacy Enhancing TechnologyModel Inversion 2026.01.05 2026.01.07 Literature Database
Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation Authors: Heba Osama, Omar Elebiary, Youssef Qassim, Mohamed Amgad, Ahmed Maghawry, Ahmed Saafan, Haitham Ghalwash | Published: 2025-12-29 SQL Injection Attack DetectionData PreprocessingMachine Learning Technology 2025.12.29 2025.12.31 Literature Database
Toward Trustworthy Agentic AI: A Multimodal Framework for Preventing Prompt Injection Attacks Authors: Toqeer Ali Syed, Mishal Ateeq Almutairi, Mahmoud Abdel Moaty | Published: 2025-12-29 Indirect Prompt InjectionPrompt validationマルチモーダル安全性 2025.12.29 2025.12.31 Literature Database
Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation Authors: Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan, Asadullah Abdullah Khan, Saad Said Alqahtani | Published: 2025-12-29 LLM活用Security Analysis Method脆弱性優先順位付け 2025.12.29 2025.12.31 Literature Database