An Adaptive Neuro-Fuzzy Blockchain-AI Framework for Secure and Intelligent FinTech Transactions Authors: Gunjan Mishra, Yash Mishra | Published: 2026-03-25 Blockchain InteroperabilityRisk Analysis Method評価メトリクス 2026.03.25 2026.03.26 Literature Database
How Vulnerable Are Edge LLMs? Authors: Ao Ding, Hongzong Li, Zi Liang, Zhanpeng Shi, Shuxin Zhuang, Shiqin Tang, Rong Feng, Ping Lu | Published: 2026-03-25 Indirect Prompt InjectionData GenerationPrompt leaking 2026.03.25 2026.03.26 Literature Database
The Cognitive Firewall:Securing Browser Based AI Agents Against Indirect Prompt Injection Via Hybrid Edge Cloud Defense Authors: Qianlong Lan, Anuj Kaul | Published: 2026-03-24 Indirect Prompt InjectionProactive DefenseAttackers and Malicious Devices 2026.03.24 2026.03.26 Literature Database
Leveraging Large Language Models for Trustworthiness Assessment of Web Applications Authors: Oleksandr Yarotskyi, José D'Abruzzo Pereira, João R. Campos | Published: 2026-03-24 セキュアコーディングPrompt leakingEvaluation Method 2026.03.24 2026.03.26 Literature Database
Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks Authors: Islam Debicha, Tayeb Kenaza, Ishak Charfi, Salah Mosbah, Mehdi Sehaki, Jean-Michel Dricot | Published: 2026-03-24 Dataset evaluationAdversarial Example DetectionEvaluation Method 2026.03.24 2026.03.26 Literature Database
An Experimental Study of Machine Learning-Based Intrusion Detection for OPC UA over Industrial Private 5G Networks Authors: Song Son Ha, Kunal Singh, Florian Foerster, Henry Beuster, Tim Kittel, Dominik Merli, Gerd Scholl | Published: 2026-03-24 Machine Learning ApplicationFeature ExtractionEvaluation Method 2026.03.24 2026.03.26 Literature Database
Not All Tokens Are Created Equal: Query-Efficient Jailbreak Fuzzing for LLMs Authors: Wenyu Chen, Xiangtao Meng, Chuanchao Zang, Li Wang, Xinyu Gao, Jianing Wang, Peng Zhan, Zheng Li, Shanqing Guo | Published: 2026-03-24 LLM Performance EvaluationPrompt InjectionEvaluation Method 2026.03.24 2026.03.26 Literature Database
Robust Safety Monitoring of Language Models via Activation Watermarking Authors: Toluwani Aremu, Daniil Ognev, Samuele Poppi, Nils Lukas | Published: 2026-03-24 WatermarkingSafety of Data GenerationPrompt Injection 2026.03.24 2026.03.26 Literature Database
A Critical Review on the Effectiveness and Privacy Threats of Membership Inference Attacks Authors: Najeeb Jebreel, David Sánchez, Josep Domingo-Ferrer | Published: 2026-03-24 Privacy LeakageMembership InferenceEvaluation Method 2026.03.24 2026.03.26 Literature Database
Beyond Theoretical Bounds: Empirical Privacy Loss Calibration for Text Rewriting Under Local Differential Privacy Authors: Weijun Li, Arnaud Grivet Sébert, Qiongkai Xu, Annabelle McIver, Mark Dras | Published: 2026-03-24 Dataset evaluationDifferential PrivacyEvaluation Method 2026.03.24 2026.03.26 Literature Database