Deanonymizing Bitcoin Transactions via Network Traffic Analysis with Semi-supervised Learning Authors: Shihan Zhang, Bing Han, Chuanyong Tian, Ruisheng Shi, Lina Lan, Qin Wang | Published: 2026-03-18 Privacy LeakageMachine Learning ApplicationEvaluation Method 2026.03.18 2026.03.25 Literature Database
SAMSEM — A Generic and Scalable Approach for IC Metal Line Segmentation Authors: Christian Gehrmann, Jonas Ricker, Simon Damm, Deruo Cheng, Julian Speith, Yiqiong Shi, Asja Fischer, Christof Paar | Published: 2026-03-17 セグメンテーション手法Loss FunctionDesign Verification 2026.03.17 2026.03.25 Literature Database
Rotated Robustness: A Training-Free Defense against Bit-Flip Attacks on Large Language Models Authors: Deng Liu, Song Chen | Published: 2026-03-17 Adversarial LearningVulnerability ManagementEvaluation Method 2026.03.17 2026.03.25 Literature Database
Resource Consumption Threats in Large Language Models Authors: Yuanhe Zhang, Xinyue Wang, Zhican Chen, Weiliu Wang, Zilu Zhang, Zhengshuo Gong, Zhenhong Zhou, Li Sun, Yang Liu, Sen Su | Published: 2026-03-17 Model DoSResource Consumption AnalysisThreat modeling 2026.03.17 2026.03.25 Literature Database
From Storage to Steering: Memory Control Flow Attacks on LLM Agents Authors: Zhenlin Xu, Xiaogang Zhu, Yu Yao, Minhui Xue, Yiliao Song | Published: 2026-03-16 2026.03.16 2026.03.25 Literature Database
$p^2$RAG: Privacy-Preserving RAG Service Supporting Arbitrary Top-$k$ Retrieval Authors: Yulong Ming, Mingyue Wang, Jijia Yang, Cong Wang, Xiaohua Jia | Published: 2026-03-16 2026.03.16 2026.03.25 Literature Database
Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12 Prompt InjectionModel Extraction AttackVulnerability Management 2026.03.12 2026.03.14 Literature Database
Understanding LLM Behavior When Encountering User-Supplied Harmful Content in Harmless Tasks Authors: Junjie Chu, Yiting Qu, Ye Leng, Michael Backes, Yun Shen, Savvas Zannettou, Yang Zhang | Published: 2026-03-12 Prompt InjectionPrompt leakingRisk Assessment 2026.03.12 2026.03.14 Literature Database
Exponential-Family Membership Inference: From LiRA and RMIA to BaVarIA Authors: Rickard Brännvall | Published: 2026-03-12 攻撃計画手法Machine Learning AlgorithmEvaluation Method 2026.03.12 2026.03.14 Literature Database
Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats Authors: Xinhao Deng, Yixiang Zhang, Jiaqing Wu, Jiaqi Bai, Sibo Yi, Zhuoheng Zou, Yue Xiao, Rennai Qiu, Jianan Ma, Jialuo Chen, Xiaohu Du, Xiaofang Yang, Shiwen Cui, Changhua Meng, Weiqiang Wang, Jiaxing Song, Ke Xu, Qi Li | Published: 2026-03-12 Indirect Prompt InjectionPrompt InjectionVulnerability Management 2026.03.12 2026.03.14 Literature Database