Literature Database

SCAFFOLD-CEGIS: Preventing Latent Security Degradation in LLM-Driven Iterative Code Refinement

Authors: Yi Chen, Yun Bian, Haiquan Wang, Shihao Li, Zhe Cui | Published: 2026-03-09
LLM Performance Evaluation
Program Analysis
脆弱性評価

Lambda-randomization: multi-dimensional randomized response made easy

Authors: Nicolas Ruiz | Published: 2026-03-05
Data Privacy Management
Data Dependency
Differential Privacy

Good-Enough LLM Obfuscation (GELO)

Authors: Anatoly Belikov, Ilya Fedotov | Published: 2026-03-05
LLM Performance Evaluation
Data Privacy Management

Efficient Privacy-Preserving Sparse Matrix-Vector Multiplication Using Homomorphic Encryption

Authors: Yang Gao, Gang Quan, Wujie Wen, Scott Piersall, Qian Lou, Liqiang Wang | Published: 2026-03-05
Sparse Model
Secure Aggregation
Data Dependency

Robustness of Agentic AI Systems via Adversarially-Aligned Jacobian Regularization

Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2026-03-04
Alignment
Robust Optimization
Optimization Methods

PTOPOFL: Privacy-Preserving Personalised Federated Learning via Persistent Homology

Authors: Kelly L Vomo-Donfack, Adryel Hoszu, Grégory Ginot, Ian Morilla | Published: 2026-03-04
Secure Aggregation
Privacy Design Principles
Federated Learning

CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security Alerts

Authors: Max Landauer, Wolfgang Hotwagner, Thorina Boenke, Florian Skopik, Markus Wurzenberger | Published: 2026-03-04
Prompt Injection
Malware Classification
Attack Method

A Multi-Dimensional Quality Scoring Framework for Decentralized LLM Inference with Proof of Quality

Authors: Arther Tian, Alex Ding, Frank Chen, Simon Wu, Aaron Chan | Published: 2026-03-04
LLM Performance Evaluation
Alignment
evaluation metrics

When Safety Becomes a Vulnerability: Exploiting LLM Alignment Homogeneity for Transferable Blocking in RAG

Authors: Junchen Li, Chao Qi, Rongzheng Wang, Qizhi Chen, Liang Xu, Di Liang, Bob Simons, Shuang Liang | Published: 2026-03-04
LLM Performance Evaluation
RAG
Poisoning attack on RAG

Measuring Privacy vs. Fidelity in Synthetic Social Media Datasets

Authors: Henry Tari, Adriana Iamnitchi | Published: 2026-03-04
LLM Performance Evaluation
Data Privacy Management
Prompt leaking