KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation Authors: Qizhi Chen, Chao Qi, Yihong Huang, Muquan Li, Rongzheng Wang, Dongyang Zhang, Ke Qin, Shuang Liang | Published: 2026-03-12 Poisoning attack on RAGデータ毒性Content Specialized for Toxicity Attacks 2026.03.12 2026.03.14 Literature Database
TOSSS: a CVE-based Software Security Benchmark for Large Language Models Authors: Marc Damie, Murat Bilgehan Ertan, Domenico Essoussi, Angela Makhanu, Gaëtan Peter, Roos Wensveen | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionEvaluation Method 2026.03.11 2026.03.13 Literature Database
Incremental Federated Learning for Intrusion Detection in IoT Networks under Evolving Threat Landscape Authors: Muaan Ur Rehman, Hayretdin Bahs, Rajesh Kalakoti | Published: 2026-03-11 evaluation metricsFederated LearningFederated Learning System 2026.03.11 2026.03.13 Literature Database
CacheSolidarity: Preventing Prefix Caching Side Channels in Multi-tenant LLM Serving Systems Authors: Panagiotis Georgios Pennas, Konstantinos Papaioannou, Marco Guarnieri, Thaleia Dimitra Doudali | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.03.11 2026.03.13 Literature Database
Detecting and Eliminating Neural Network Backdoors Through Active Paths with Application to Intrusion Detection Authors: Eirik Høyheim, Magnus Wiik Eckhoff, Gudmund Grov, Robert Flood, David Aspinall | Published: 2026-03-11 データ毒性Backdoor AttackEvaluation Method 2026.03.11 2026.03.13 Literature Database
Enhancing Network Intrusion Detection Systems: A Multi-Layer Ensemble Approach to Mitigate Adversarial Attacks Authors: Nasim Soltani, Shayan Nejadshamsi, Zakaria Abou El Houda, Raphael Khoury, Kelton A. P. Costa, Tiago H. Falk, Anderson R. Avila | Published: 2026-03-11 Certified RobustnessMachine Learning AlgorithmEvaluation Method 2026.03.11 2026.03.13 Literature Database
Don’t Let the Claw Grip Your Hand: A Security Analysis and Defense Framework for OpenClaw Authors: Zhengyang Shan, Jiayun Xin, Yue Zhang, Minghui Xu | Published: 2026-03-11 Indirect Prompt InjectionPrompt Injection安全性分析 2026.03.11 2026.03.13 Literature Database
Compartmentalization-Aware Automated Program Repair Authors: Jia Hu, Youcheng Sun, Pierre Olivier | Published: 2026-03-10 Prompt InjectionDynamic Vulnerability ManagementVulnerability Management 2026.03.10 2026.03.12 Literature Database
CyberThreat-Eval: Can Large Language Models Automate Real-World Threat Research? Authors: Xiangsen Chen, Xuan Feng, Shuo Chen, Matthieu Maitre, Sudipto Rakshit, Diana Duvieilh, Ashley Picone, Nan Tang | Published: 2026-03-10 Disabling Safety Mechanisms of LLMLLM Performance EvaluationIndirect Prompt Injection 2026.03.10 2026.03.12 Literature Database
FlexServe: A Fast and Secure LLM Serving System for Mobile Devices with Flexible Resource Isolation Authors: Yinpeng Wu, Yitong Chen, Lixiang Wang, Jinyu Gu, Zhichao Hua, Yubin Xia | Published: 2026-03-10 LLM Performance Evaluationセキュアメモリ設計Large Language Model 2026.03.10 2026.03.12 Literature Database