Literature Database

Sequential Membership Inference Attacks

Authors: Thomas Michel, Debabrota Basu, Emilie Kaufmann | Published: 2026-02-18
Privacy Risk Management
Membership Inference
Defense Method

Recursive language models for jailbreak detection: a procedural defense for tool-augmented agents

Authors: Doron Shavit | Published: 2026-02-18
Large Language Model
Analysis of Detection Methods
評価メトリクス

Phase-Based Bit Commitment Protocol

Authors: Janis Nötzel, Anshul Singhal, Peter van Loock | Published: 2026-02-18
Data Protection
Physical layer security
Quantum Information and Quantum Computing

Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification

Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18
LLM Performance Evaluation
Indirect Prompt Injection
Prompt Injection

A Content-Based Framework for Cybersecurity Refusal Decisions in Large Language Models

Authors: Meirav Segal, Noa Linder, Omer Antverg, Gil Gekker, Tomer Fichman, Omri Bodenheimer, Edan Maor, Omer Nevo | Published: 2026-02-17
Prompt Injection
Threat Model
Defense Method

SecCodeBench-V2 Technical Report

Authors: Longfei Chen, Ji Zhao, Lanxiao Cui, Tong Su, Xingbo Pan, Ziyang Li, Yongxing Wu, Qijiang Cao, Qiyao Cai, Jing Zhang, Yuandong Ni, Junyao He, Zeyu Zhang, Chao Ge, Xuhuai Lu, Zeyu Gao, Yuxin Cui, Weisen Chen, Yuxuan Peng, Shengping Wang, Qi Li, Yukai Huang, Yukun Liu, Tuo Zhou, Terry Yue Zhuo, Junyang Lin, Chao Zhang | Published: 2026-02-17
Test Case Generation
Vulnerability Mitigation Technique
評価メトリクス

A Unified Evaluation of Learning-Based Similarity Techniques for Malware Detection

Authors: Udbhav Prasad, Aniesh Chawla | Published: 2026-02-17
Poisoning
Malware Detection Scenario
評価メトリクス

Exposing the Systematic Vulnerability of Open-Weight Models to Prefill Attacks

Authors: Lukas Struppek, Adam Gleave, Kellin Pelrine | Published: 2026-02-16
Prompt Injection
Human Rights and Technology
攻撃成功率

LRD-MPC: Efficient MPC Inference through Low-rank Decomposition

Authors: Tingting Tang, Yongqin Wang, Murali Annavaram | Published: 2026-02-16
MPCプロトコルの概要
Algorithm
Secret Distributed Computation

Differentially Private Retrieval-Augmented Generation

Authors: Tingting Tang, James Flemings, Yongqin Wang, Murali Annavaram | Published: 2026-02-16
RAG
Poisoning attack on RAG
Differential Privacy