$α^3$-SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks Authors: Mohamed Amine Ferrag, Abderrahmane Lakas, Merouane Debbah | Published: 2026-01-26 LLM活用Security AssurancePrompt Injection 2026.01.26 2026.01.28 Literature Database
NeuroFilter: Privacy Guardrails for Conversational LLM Agents Authors: Saswat Das, Ferdinando Fioretto | Published: 2026-01-21 Privacy ProtectionPrompt Injectionマルチターン攻撃分析 2026.01.21 2026.01.23 Literature Database
Be Your Own Red Teamer: Safety Alignment via Self-Play and Reflective Experience Replay Authors: Hao Wang, Yanting Wang, Hao Li, Rui Li, Lei Sha | Published: 2026-01-15 Prompt InjectionAdversarial Attack AnalysisSelf-Learning Method 2026.01.15 2026.01.17 Literature Database
ReasAlign: Reasoning Enhanced Safety Alignment against Prompt Injection Attack Authors: Hao Li, Yankai Yang, G. Edward Suh, Ning Zhang, Chaowei Xiao | Published: 2026-01-15 LLM活用Indirect Prompt InjectionPrompt Injection 2026.01.15 2026.01.17 Literature Database
The Promptware Kill Chain: How Prompt Injections Gradually Evolved Into a Multi-Step Malware Authors: Ben Nassi, Bruce Schneier, Oleg Brodt | Published: 2026-01-14 LLM活用Indirect Prompt InjectionPrompt Injection 2026.01.14 2026.01.16 Literature Database
SpatialJB: How Text Distribution Art Becomes the “Jailbreak Key” for LLM Guardrails Authors: Zhiyi Mou, Jingyuan Yang, Zeheng Qian, Wangze Ni, Tianfang Xiao, Ning Liu, Chen Zhang, Zhan Qin, Kui Ren | Published: 2026-01-14 LLM活用Prompt InjectionLarge Language Model 2026.01.14 2026.01.16 Literature Database
A Decompilation-Driven Framework for Malware Detection with Large Language Models Authors: Aniesh Chawla, Udbhav Prasad | Published: 2026-01-14 LLM活用Prompt InjectionMulti-Domain Data Analysis 2026.01.14 2026.01.16 Literature Database
Evaluating Implicit Regulatory Compliance in LLM Tool Invocation via Logic-Guided Synthesis Authors: Da Song, Yuheng Huang, Boqi Chen, Tianshuo Cong, Randy Goebel, Lei Ma, Foutse Khomh | Published: 2026-01-13 LLM活用Prompt InjectionPerformance Evaluation 2026.01.13 2026.01.15 Literature Database
SecureCAI: Injection-Resilient LLM Assistants for Cybersecurity Operations Authors: Mohammed Himayath Ali, Mohammed Aqib Abdullah, Mohammed Mudassir Uddin, Shahnawaz Alam | Published: 2026-01-12 Indirect Prompt InjectionPrompt InjectionAdversarial Attack Analysis 2026.01.12 2026.01.14 Literature Database
When Bots Take the Bait: Exposing and Mitigating the Emerging Social Engineering Attack in Web Automation Agent Authors: Xinyi Wu, Geng Hong, Yueyue Chen, MingXuan Liu, Feier Jin, Xudong Pan, Jiarun Dai, Baojun Liu | Published: 2026-01-12 Indirect Prompt InjectionPrompt InjectionUser Behavior Analysis 2026.01.12 2026.01.14 Literature Database