Literature Database

KEPo: Knowledge Evolution Poison on Graph-based Retrieval-Augmented Generation

Authors: Qizhi Chen, Chao Qi, Yihong Huang, Muquan Li, Rongzheng Wang, Dongyang Zhang, Ke Qin, Shuang Liang | Published: 2026-03-12
Poisoning attack on RAG
データ毒性
Content Specialized for Toxicity Attacks

TOSSS: a CVE-based Software Security Benchmark for Large Language Models

Authors: Marc Damie, Murat Bilgehan Ertan, Domenico Essoussi, Angela Makhanu, Gaëtan Peter, Roos Wensveen | Published: 2026-03-11
LLM Performance Evaluation
Prompt Injection
Evaluation Method

Incremental Federated Learning for Intrusion Detection in IoT Networks under Evolving Threat Landscape

Authors: Muaan Ur Rehman, Hayretdin Bahs, Rajesh Kalakoti | Published: 2026-03-11
evaluation metrics
Federated Learning
Federated Learning System

CacheSolidarity: Preventing Prefix Caching Side Channels in Multi-tenant LLM Serving Systems

Authors: Panagiotis Georgios Pennas, Konstantinos Papaioannou, Marco Guarnieri, Thaleia Dimitra Doudali | Published: 2026-03-11
LLM Performance Evaluation
Prompt Injection
Prompt leaking

Detecting and Eliminating Neural Network Backdoors Through Active Paths with Application to Intrusion Detection

Authors: Eirik Høyheim, Magnus Wiik Eckhoff, Gudmund Grov, Robert Flood, David Aspinall | Published: 2026-03-11
データ毒性
Backdoor Attack
Evaluation Method

Enhancing Network Intrusion Detection Systems: A Multi-Layer Ensemble Approach to Mitigate Adversarial Attacks

Authors: Nasim Soltani, Shayan Nejadshamsi, Zakaria Abou El Houda, Raphael Khoury, Kelton A. P. Costa, Tiago H. Falk, Anderson R. Avila | Published: 2026-03-11
Certified Robustness
Machine Learning Algorithm
Evaluation Method

Don’t Let the Claw Grip Your Hand: A Security Analysis and Defense Framework for OpenClaw

Authors: Zhengyang Shan, Jiayun Xin, Yue Zhang, Minghui Xu | Published: 2026-03-11
Indirect Prompt Injection
Prompt Injection
安全性分析

Compartmentalization-Aware Automated Program Repair

Authors: Jia Hu, Youcheng Sun, Pierre Olivier | Published: 2026-03-10
Prompt Injection
Dynamic Vulnerability Management
Vulnerability Management

CyberThreat-Eval: Can Large Language Models Automate Real-World Threat Research?

Authors: Xiangsen Chen, Xuan Feng, Shuo Chen, Matthieu Maitre, Sudipto Rakshit, Diana Duvieilh, Ashley Picone, Nan Tang | Published: 2026-03-10
Disabling Safety Mechanisms of LLM
LLM Performance Evaluation
Indirect Prompt Injection

FlexServe: A Fast and Secure LLM Serving System for Mobile Devices with Flexible Resource Isolation

Authors: Yinpeng Wu, Yitong Chen, Lixiang Wang, Jinyu Gu, Zhichao Hua, Yubin Xia | Published: 2026-03-10
LLM Performance Evaluation
セキュアメモリ設計
Large Language Model