Don’t Let the Claw Grip Your Hand: A Security Analysis and Defense Framework for OpenClaw Authors: Zhengyang Shan, Jiayun Xin, Yue Zhang, Minghui Xu | Published: 2026-03-11 Indirect Prompt InjectionPrompt Injection安全性分析 2026.03.11 2026.03.13 Literature Database
Compartmentalization-Aware Automated Program Repair Authors: Jia Hu, Youcheng Sun, Pierre Olivier | Published: 2026-03-10 Prompt InjectionDynamic Vulnerability ManagementVulnerability Management 2026.03.10 2026.03.12 Literature Database
CyberThreat-Eval: Can Large Language Models Automate Real-World Threat Research? Authors: Xiangsen Chen, Xuan Feng, Shuo Chen, Matthieu Maitre, Sudipto Rakshit, Diana Duvieilh, Ashley Picone, Nan Tang | Published: 2026-03-10 Disabling Safety Mechanisms of LLMLLM Performance EvaluationIndirect Prompt Injection 2026.03.10 2026.03.12 Literature Database
FlexServe: A Fast and Secure LLM Serving System for Mobile Devices with Flexible Resource Isolation Authors: Yinpeng Wu, Yitong Chen, Lixiang Wang, Jinyu Gu, Zhichao Hua, Yubin Xia | Published: 2026-03-10 LLM Performance Evaluationセキュアメモリ設計Large Language Model 2026.03.10 2026.03.12 Literature Database
SCAFFOLD-CEGIS: Preventing Latent Security Degradation in LLM-Driven Iterative Code Refinement Authors: Yi Chen, Yun Bian, Haiquan Wang, Shihao Li, Zhe Cui | Published: 2026-03-09 LLM Performance EvaluationProgram Analysis脆弱性評価 2026.03.09 2026.03.11 Literature Database
Lambda-randomization: multi-dimensional randomized response made easy Authors: Nicolas Ruiz | Published: 2026-03-05 Data Privacy ManagementData DependencyDifferential Privacy 2026.03.05 2026.03.07 Literature Database
Good-Enough LLM Obfuscation (GELO) Authors: Anatoly Belikov, Ilya Fedotov | Published: 2026-03-05 LLM Performance EvaluationData Privacy Management 2026.03.05 2026.03.07 Literature Database
Efficient Privacy-Preserving Sparse Matrix-Vector Multiplication Using Homomorphic Encryption Authors: Yang Gao, Gang Quan, Wujie Wen, Scott Piersall, Qian Lou, Liqiang Wang | Published: 2026-03-05 Sparse ModelSecure AggregationData Dependency 2026.03.05 2026.03.07 Literature Database
Robustness of Agentic AI Systems via Adversarially-Aligned Jacobian Regularization Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2026-03-04 AlignmentRobust OptimizationOptimization Methods 2026.03.04 2026.03.06 Literature Database
PTOPOFL: Privacy-Preserving Personalised Federated Learning via Persistent Homology Authors: Kelly L Vomo-Donfack, Adryel Hoszu, Grégory Ginot, Ian Morilla | Published: 2026-03-04 Secure AggregationPrivacy Design PrinciplesFederated Learning 2026.03.04 2026.03.06 Literature Database