Literature Database

Scaling up Privacy-Preserving ML: A CKKS Implementation of Llama-2-7B

Authors: Jaiyoung Park, Sejin Park, Jai Hyun Park, Jung Ho Ahn, Jung Hee Cheon, Guillaume Hanrot, Jung Woo Kim, Minje Park, Damien Stehlé | Published: 2026-01-26
LLM活用
Prompt leaking
線形代数最適化

Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents

Authors: Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy | Published: 2026-01-26
LLM活用
RAG
Security Assurance

PAL*M: Property Attestation for Large Generative Models

Authors: Prach Chantasantitam, Adam Ilyas Caulfield, Vasisht Duddu, Lachlan J. Gunn, N. Asokan | Published: 2026-01-22
RAG
Security Assurance
Framework

On damage of interpolation to adversarial robustness in regression

Authors: Jingfu Peng, Yuhong Yang | Published: 2026-01-22
Backdoor Detection
Robustness Evaluation
Adversarial Learning

CAFE-GB: Scalable and Stable Feature Selection for Malware Detection via Chunk-wise Aggregated Gradient Boosting

Authors: Ajvad Haneef K, Karan Kuwar Singh, Madhu Kumar S D | Published: 2026-01-22
Machine Learning Algorithm
Feature Selection Method
Interpretability

Connect the Dots: Knowledge Graph-Guided Crawler Attack on Retrieval-Augmented Generation Systems

Authors: Mengyu Yao, Ziqi Zhang, Ning Luo, Shaofei Li, Yifeng Cai, Xiangqun Chen, Yao Guo, Ding Li | Published: 2026-01-22
Poisoning attack on RAG
Robustness Evaluation
知識グラフ設計

Predictive Coding and Information Bottleneck for Hallucination Detection in Large Language Models

Authors: Manish Bhatt | Published: 2026-01-22
Detection of Hallucinations
Framework
Interpretability

Data-Free Privacy-Preserving for LLMs via Model Inversion and Selective Unlearning

Authors: Xinjie Zhou, Zhihui Yang, Lechao Cheng, Sai Wu, Gang Chen | Published: 2026-01-22
LLM活用
Privacy Protection
Differential Privacy

Lightweight LLMs for Network Attack Detection in IoT Networks

Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21
IoT Security Risks
LLM活用
Poisoning attack on RAG

NeuroFilter: Privacy Guardrails for Conversational LLM Agents

Authors: Saswat Das, Ferdinando Fioretto | Published: 2026-01-21
Privacy Protection
Prompt Injection
マルチターン攻撃分析