Scaling up Privacy-Preserving ML: A CKKS Implementation of Llama-2-7B Authors: Jaiyoung Park, Sejin Park, Jai Hyun Park, Jung Ho Ahn, Jung Hee Cheon, Guillaume Hanrot, Jung Woo Kim, Minje Park, Damien Stehlé | Published: 2026-01-26 LLM活用Prompt leaking線形代数最適化 2026.01.26 2026.01.28 Literature Database
HardSecBench: Benchmarking the Security Awareness of LLMs for Hardware Code Generation Authors: Qirui Chen, Jingxian Shuai, Shuangwu Chen, Shenghao Ye, Zijian Wen, Xufei Su, Jie Jin, Jiangming Li, Jun Chen, Xiaobin Tan, Jian Yang | Published: 2026-01-20 コード生成手法Security AssurancePrompt leaking 2026.01.20 2026.01.22 Literature Database
Defenses Against Prompt Attacks Learn Surface Heuristics Authors: Shawn Li, Chenxiao Yu, Zhiyu Ni, Hao Li, Charith Peris, Chaowei Xiao, Yue Zhao | Published: 2026-01-12 Prompt leakingPerformance EvaluationAdversarial Attack Analysis 2026.01.12 2026.01.14 Literature Database
Securing the AI Supply Chain: What Can We Learn From Developer-Reported Security Issues and Solutions of AI Projects? Authors: The Anh Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2025-12-29 Security Analysis MethodData-Driven Vulnerability AssessmentPrompt leaking 2025.12.29 2025.12.31 Literature Database
GateBreaker: Gate-Guided Attacks on Mixture-of-Expert LLMs Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-12-24 Sparse ModelPrompt leaking安全性に関連するマルチモーダルなアプローチ 2025.12.24 2025.12.26 Literature Database
ChatGPT: Excellent Paper! Accept It. Editor: Imposter Found! Review Rejected Authors: Kanchon Gharami, Sanjiv Kumar Sarkar, Yongxin Liu, Shafika Showkat Moni | Published: 2025-12-23 Prompt leakingModel Extraction AttackAdversarial Attack Assessment 2025.12.23 2025.12.25 Literature Database
From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22 RAGData Selection StrategyPrompt leaking 2025.12.22 2025.12.24 Literature Database
Prefix Probing: Lightweight Harmful Content Detection for Large Language Models Authors: Jirui Yang, Hengqi Guo, Zhihui Lu, Yi Zhao, Yuansen Zhang, Shijing Hu, Qiang Duan, Yinggui Wang, Tao Wei | Published: 2025-12-18 Token Distribution AnalysisPrompt InjectionPrompt leaking 2025.12.18 2025.12.20 Literature Database
In-Context Probing for Membership Inference in Fine-Tuned Language Models Authors: Zhexi Lu, Hongliang Chi, Nathalie Baracaldo, Swanand Ravindra Kadhe, Yuseok Jeon, Lei Yu | Published: 2025-12-18 Bias Detection in AI OutputPrivacy-Preserving Machine LearningPrompt leaking 2025.12.18 2025.12.20 Literature Database
ContextLeak: Auditing Leakage in Private In-Context Learning Methods Authors: Jacob Choi, Shuying Cao, Xingjian Dong, Wang Bill Zhu, Robin Jia, Sai Praneeth Karimireddy | Published: 2025-12-18 Data LeakagePrivacy-Preserving Machine LearningPrompt leaking 2025.12.18 2025.12.20 Literature Database