Literature Database

IoT Device Identification with Machine Learning: Common Pitfalls and Best Practices

Authors: Kahraman Kostas, Rabia Yasa Kostas | Published: 2026-01-28
IoT Device Identification
Data Protection Method
Machine Learning Technology

Eliciting Least-to-Most Reasoning for Phishing URL Detection

Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28
LLM Performance Evaluation
Prompt Injection
Prompt leaking

GAVEL: Towards rule-based safety through activation monitoring

Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27
LLM Performance Evaluation
Indirect Prompt Injection
Data Generation Method

RvB: Automating AI System Hardening via Iterative Red-Blue Games

Authors: Lige Huang, Zicheng Liu, Jie Zhang, Lewen Yan, Dongrui Liu, Jing Shao | Published: 2026-01-27
Relationship of AI Systems
Adversarial Learning
Automated Vulnerability Remediation

CHEHAB RL: Learning to Optimize Fully Homomorphic Encryption Computations

Authors: Bilel Sefsaf, Abderraouf Dandani, Abdessamed Seddiki, Arab Mohammed, Eduardo Chielle, Michail Maniatakos, Riyadh Baghdadi | Published: 2026-01-27
FHEの最適化
コード生成手法
Reinforcement Learning

AI-driven Intrusion Detection for UAV in Smart Urban Ecosystems: A Comprehensive Survey

Authors: Abdullah Khanfor, Raby Hamadi, Noureddine Lasla, Hakim Ghazzai | Published: 2026-01-27
UAV Security
Data Collection
Machine Learning Algorithm

LLMs Can Unlearn Refusal with Only 1,000 Benign Samples

Authors: Yangyang Guo, Ziwei Xu, Si Liu, Zhiming Zheng, Mohan Kankanhalli | Published: 2026-01-27
LLM活用
Large Language Model
安全性評価

AgenticSCR: An Autonomous Agentic Secure Code Review for Immature Vulnerabilities Detection

Authors: Wachiraphan Charoenwet, Kla Tantithamthavorn, Patanamon Thongtanunam, Hong Yi Lin, Minwoo Jeong, Ming Wu | Published: 2026-01-27
LLM活用
Security Assurance
脆弱性検出手法

Thought-Transfer: Indirect Targeted Poisoning Attacks on Chain-of-Thought Reasoning Models

Authors: Harsh Chaudhari, Ethan Rathbum, Hanna Foerster, Jamie Hayes, Matthew Jagielski, Milad Nasr, Ilia Shumailov, Alina Oprea | Published: 2026-01-27
LLM活用
Data Contamination Detection
Calculation of Output Harmfulness

$α^3$-SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks

Authors: Mohamed Amine Ferrag, Abderrahmane Lakas, Merouane Debbah | Published: 2026-01-26
LLM活用
Security Assurance
Prompt Injection