Literature Database

Privacy-Preserving EHR Data Transformation via Geometric Operators: A Human-AI Co-Design Technical Report

Authors: Maolin Wang, Beining Bao, Gan Yuan, Hongyu Chen, Bingkun Zhao, Baoshuo Kan, Jiming Xu, Qi Shi, Yinggong Zhao, Yao Wang, Wei Ying Ma, Jun Yan | Published: 2026-03-24
Data Privacy Assessment
Privacy Leakage
Evaluation Method

SoK: The Attack Surface of Agentic AI — Tools, and Autonomy

Authors: Ali Dehghantanha, Sajad Homayoun | Published: 2026-03-24
RAG
Poisoning attack on RAG
Risk Management

Explainable Threat Attribution for IoT Networks Using Conditional SHAP and Flow Behavior Modelling

Authors: Samuel Ozechi, Jennifer Okonkwoabutu | Published: 2026-03-24
Model DoS
Feature Extraction
Threat Actor Support

CIPL: A Target-Independent Framework for Channel-Inversion Privacy Leakage in Agents

Authors: Tao Huang, Chen Hou, Jiayang Meng | Published: 2026-03-24
Privacy Leakage
Model Inversion
Evaluation Method

Does Teaming-Up LLMs Improve Secure Code Generation? A Comprehensive Evaluation with Multi-LLMSecCodeEval

Authors: Bushra Sabir, Shigang Liu, Seung Ick Jang, Sharif Abuadbba, Yansong Gao, Kristen Moore, SangCheol Kim, Hyoungshick Kim, Surya Nepal | Published: 2026-03-24
LLM Performance Evaluation
Model DoS
Adversarial Learning

Structured Visual Narratives Undermine Safety Alignment in Multimodal Large Language Models

Authors: Rui Yang Tan, Yujia Hu, Roy Ka-Wei Lee | Published: 2026-03-23
マルチモーダル安全性
Large Language Model
Evaluation Method

Towards Secure Retrieval-Augmented Generation: A Comprehensive Review of Threats, Defenses and Benchmarks

Authors: Yanming Mu, Hao Hu, Feiyang Li, Qiao Yuan, Jiang Wu, Zichuan Liu, Pengcheng Liu, Mei Wang, Hongwei Zhou, Yuling Liu | Published: 2026-03-23
RAG
Poisoning attack on RAG
データ毒性攻撃

Auditing MCP Servers for Over-Privileged Tool Capabilities

Authors: Charoes Huang, Xin Huang, Amin Milani Fard | Published: 2026-03-23
Dynamic Analysis
Evaluation Method
Static Analysis

Functional Subspace Watermarking for Large Language Models

Authors: Zikang Ding, Junhao Li, Suling Wu, Junchi Yao, Hongbo Liu, Lijie Hu | Published: 2026-03-19
Watermarking
Prompt leaking
Membership Inference

Measuring and Exploiting Confirmation Bias in LLM-Assisted Security Code Review

Authors: Dimitris Mitropoulos, Nikolaos Alexopoulos, Georgios Alexopoulos, Diomidis Spinellis | Published: 2026-03-19
Indirect Prompt Injection
Prompt validation
Review and Investigation