SCAFFOLD-CEGIS: Preventing Latent Security Degradation in LLM-Driven Iterative Code Refinement Authors: Yi Chen, Yun Bian, Haiquan Wang, Shihao Li, Zhe Cui | Published: 2026-03-09 LLM Performance EvaluationProgram Analysis脆弱性評価 2026.03.09 2026.03.11 Literature Database
Lambda-randomization: multi-dimensional randomized response made easy Authors: Nicolas Ruiz | Published: 2026-03-05 Data Privacy ManagementData DependencyDifferential Privacy 2026.03.05 2026.03.07 Literature Database
Good-Enough LLM Obfuscation (GELO) Authors: Anatoly Belikov, Ilya Fedotov | Published: 2026-03-05 LLM Performance EvaluationData Privacy Management 2026.03.05 2026.03.07 Literature Database
Efficient Privacy-Preserving Sparse Matrix-Vector Multiplication Using Homomorphic Encryption Authors: Yang Gao, Gang Quan, Wujie Wen, Scott Piersall, Qian Lou, Liqiang Wang | Published: 2026-03-05 Sparse ModelSecure AggregationData Dependency 2026.03.05 2026.03.07 Literature Database
Robustness of Agentic AI Systems via Adversarially-Aligned Jacobian Regularization Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2026-03-04 AlignmentRobust OptimizationOptimization Methods 2026.03.04 2026.03.06 Literature Database
PTOPOFL: Privacy-Preserving Personalised Federated Learning via Persistent Homology Authors: Kelly L Vomo-Donfack, Adryel Hoszu, Grégory Ginot, Ian Morilla | Published: 2026-03-04 Secure AggregationPrivacy Design PrinciplesFederated Learning 2026.03.04 2026.03.06 Literature Database
CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security Alerts Authors: Max Landauer, Wolfgang Hotwagner, Thorina Boenke, Florian Skopik, Markus Wurzenberger | Published: 2026-03-04 Prompt InjectionMalware ClassificationAttack Method 2026.03.04 2026.03.06 Literature Database
A Multi-Dimensional Quality Scoring Framework for Decentralized LLM Inference with Proof of Quality Authors: Arther Tian, Alex Ding, Frank Chen, Simon Wu, Aaron Chan | Published: 2026-03-04 LLM Performance EvaluationAlignmentevaluation metrics 2026.03.04 2026.03.06 Literature Database
When Safety Becomes a Vulnerability: Exploiting LLM Alignment Homogeneity for Transferable Blocking in RAG Authors: Junchen Li, Chao Qi, Rongzheng Wang, Qizhi Chen, Liang Xu, Di Liang, Bob Simons, Shuang Liang | Published: 2026-03-04 LLM Performance EvaluationRAGPoisoning attack on RAG 2026.03.04 2026.03.06 Literature Database
Measuring Privacy vs. Fidelity in Synthetic Social Media Datasets Authors: Henry Tari, Adriana Iamnitchi | Published: 2026-03-04 LLM Performance EvaluationData Privacy ManagementPrompt leaking 2026.03.04 2026.03.06 Literature Database