CNT: Safety-oriented Function Reuse across LLMs via Cross-Model Neuron Transfer Authors: Yue Zhao, Yujia Gong, Ruigang Liang, Shenchen Zhu, Kai Chen, Xuejing Yuan, Wangjun Zhang | Published: 2026-03-19 AlignmentCalculation of Output HarmfulnessEvaluation Method 2026.03.19 2026.03.25 Literature Database
Prompt Control-Flow Integrity: A Priority-Aware Runtime Defense Against Prompt Injection in LLM Systems Authors: Md Takrim Ul Alam, Akif Islam, Mohd Ruhul Ameen, Abu Saleh Musa Miah, Jungpil Shin | Published: 2026-03-19 LLM Performance EvaluationIndirect Prompt InjectionEvaluation Method 2026.03.19 2026.03.25 Literature Database
PlanTwin: Privacy-Preserving Planning Abstractions for Cloud-Assisted LLM Agents Authors: Guangsheng Yu, Qin Wang, Rui Lang, Shuai Su, Xu Wang | Published: 2026-03-19 Indirect Prompt InjectionPrivacy LeakageEvaluation Method 2026.03.19 2026.03.25 Literature Database
Differential Privacy in Generative AI Agents: Analysis and Optimal Tradeoffs Authors: Ya-Ting Yang, Quanyan Zhu | Published: 2026-03-18 Privacy LeakageDifferential PrivacyEvaluation Method 2026.03.18 2026.03.25 Literature Database
Machine Learning for Network Attacks Classification and Statistical Evaluation of Machine Learning for Network Attacks Classification and Adversarial Learning Methodologies for Synthetic Data Generation Authors: Iakovos-Christos Zarkadis, Christos Douligeris | Published: 2026-03-18 PoisoningDifferential PrivacyEvaluation Method 2026.03.18 2026.03.25 Literature Database
rSDNet: Unified Robust Neural Learning against Label Noise and Adversarial Attacks Authors: Suryasis Jana, Abhik Ghosh | Published: 2026-03-18 PoisoningRobustness EvaluationEvaluation Method 2026.03.18 2026.03.25 Literature Database
DDH-based schemes for multi-party Function Secret Sharing Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2026-03-18 DPPセット生成Data Privacy AssessmentEvaluation Method 2026.03.18 2026.03.25 Literature Database
Caging the Agents: A Zero Trust Security Architecture for Autonomous AI in Healthcare Authors: Saikat Maiti | Published: 2026-03-18 Indirect Prompt InjectionData Protection MethodVulnerability Research 2026.03.18 2026.03.25 Literature Database
Federated Computing as Code (FCaC): Sovereignty-aware Systems by Design Authors: Enzo Fenoglio, Philip Treleaven | Published: 2026-03-18 Data Integrity ConstraintsEvaluation MethodFederated Learning 2026.03.18 2026.03.25 Literature Database
Network- and Device-Level Cyber Deception for Contested Environments Using RL and LLMs Authors: Abhijeet Sahu, Shuva Paul, Rochard Macwan | Published: 2026-03-18 LLM Performance EvaluationPoisoning attack on RAGEvaluation Method 2026.03.18 2026.03.25 Literature Database