LLM-FS: Zero-Shot Feature Selection for Effective and Interpretable Malware Detection Authors: Naveen Gill, Ajvad Haneef K, Madhu Kumar S D | Published: 2026-02-10 Prompt InjectionModel Selection Methodevaluation metrics 2026.02.10 2026.02.12 Literature Database
Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10 Indirect Prompt InjectionPrompt InjectionVulnerability Analysis 2026.02.10 2026.02.12 Literature Database
CIC-Trap4Phish: A Unified Multi-Format Dataset for Phishing and Quishing Attachment Detection Authors: Fatemeh Nejati, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali A. Ghorbani, Sajjad Dadkhah | Published: 2026-02-09 Phishing DetectionPrompt InjectionFeature Engineering 2026.02.09 2026.02.11 Literature Database
Large Language Lobotomy: Jailbreaking Mixture-of-Experts via Expert Silencing Authors: Jona te Lintelo, Lichao Wu, Stjepan Picek | Published: 2026-02-09 Prompt InjectionLarge Language Model安全性分析 2026.02.09 2026.02.11 Literature Database
Sparse Models, Sparse Safety: Unsafe Routes in Mixture-of-Experts LLMs Authors: Yukun Jiang, Hai Huang, Mingjie Li, Yage Zhang, Michael Backes, Yang Zhang | Published: 2026-02-09 Sparsity DefensePrompt Injection安全性分析 2026.02.09 2026.02.11 Literature Database
Clouding the Mirror: Stealthy Prompt Injection Attacks Targeting LLM-based Phishing Detection Authors: Takashi Koide, Hiroki Nakano, Daiki Chiba | Published: 2026-02-05 Indirect Prompt Injectionフィッシング検出手法Prompt Injection 2026.02.05 2026.02.07 Literature Database
How Few-shot Demonstrations Affect Prompt-based Defenses Against LLM Jailbreak Attacks Authors: Yanshu Wang, Shuaishuai Yang, Jingjing He, Tong Yang | Published: 2026-02-04 LLM Performance EvaluationPrompt InjectionLarge Language Model 2026.02.04 2026.02.06 Literature Database
RedVisor: Reasoning-Aware Prompt Injection Defense via Zero-Copy KV Cache Reuse Authors: Mingrui Liu, Sixiao Zhang, Cheng Long, Kwok-Yan Lam | Published: 2026-02-02 FrameworkPrompt Injection防御手法の統合 2026.02.02 2026.02.04 Literature Database
Eliciting Least-to-Most Reasoning for Phishing URL Detection Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.01.28 2026.01.30 Literature Database
$α^3$-SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks Authors: Mohamed Amine Ferrag, Abderrahmane Lakas, Merouane Debbah | Published: 2026-01-26 LLM活用Security AssurancePrompt Injection 2026.01.26 2026.01.28 Literature Database