Image-based Prompt Injection: Hijacking Multimodal LLMs through Visually Embedded Adversarial Instructions Authors: Neha Nagaraja, Lan Zhang, Zhilong Wang, Bo Zhang, Pawan Patil | Published: 2026-03-04 Indirect Prompt Injectionプロンプト埋め込み手法Visual Techniques 2026.03.04 2026.03.06 Literature Database
Gravity Falls: A Comparative Analysis of Domain-Generation Algorithm (DGA) Detection Methods for Mobile Device Spearphishing Authors: Adam Dorian Wong, John D. Hastings | Published: 2026-03-03 フィッシング検出手法Malware Detection 2026.03.03 2026.03.04 Literature Database
Kraken: Higher-order EM Side-Channel Attacks on DNNs in Near and Far Field Authors: Peter Horvath, Ilia Shumailov, Lukasz Chmielewski, Lejla Batina, Yuval Yarom | Published: 2026-03-03 LLM Performance EvaluationModel Extraction Attack 2026.03.03 2026.03.04 Literature Database
Understanding the Resource Cost of Fully Homomorphic Encryption in Quantum Federated Learning Authors: Lukas Böhm, Arjhun Swaminathan, Anika Hannemann, Erik Buchmann | Published: 2026-03-03 Secure AggregationData Privacy ManagementQuantum Blockchain Technology 2026.03.03 2026.03.04 Literature Database
Extending the Formalism and Theoretical Foundations of Cryptography to AI Authors: Federico Villa, F. Betül Durak, Tadayoshi Kohno, Tapdig Maharramli, Franziska Roesner | Published: 2026-03-03 Data Privacy Management安全性評価Threat Model 2026.03.03 2026.03.04 Literature Database
ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense Authors: Nancy Lau, Louis Sloot, Jyoutir Raj, Giuseppe Marco Boscardin, Evan Harris, Dylan Bowman, Mario Brajkovski, Jaideep Chawla, Dan Zhao | Published: 2026-03-02 LLM Performance EvaluationIndirect Prompt InjectionVulnerability Assessment Method 2026.03.02 2026.03.04 Literature Database
Protection against Source Inference Attacks in Federated Learning Authors: Andreas Athanasiou, Kangsoo Jung, Catuscia Palamidessi | Published: 2026-03-02 Secure AggregationTrigger DetectionPoisoning 2026.03.02 2026.03.04 Literature Database
Real Money, Fake Models: Deceptive Model Claims in Shadow APIs Authors: Yage Zhang, Yukun Jiang, Zeyuan Chen, Michael Backes, Xinyue Shen, Yang Zhang | Published: 2026-03-02 LLM Performance EvaluationData Privacy Management 2026.03.02 2026.03.04 Literature Database
Co-Evolutionary Multi-Modal Alignment via Structured Adversarial Evolution Authors: Guoxin Shi, Haoyu Wang, Zaihui Yang, Yuxing Wang, Yongzhe Chang | Published: 2026-03-02 Alignment安全性評価機械学習応用 2026.03.02 2026.03.04 Literature Database
DualSentinel: A Lightweight Framework for Detecting Targeted Attacks in Black-box LLM via Dual Entropy Lull Pattern Authors: Xiaoyi Pang, Xuanyi Hao, Pengyu Liu, Qi Luo, Song Guo, Zhibo Wang | Published: 2026-03-02 LLM Performance EvaluationIndirect Prompt InjectionPrompt Injection 2026.03.02 2026.03.04 Literature Database