PINA: Prompt Injection Attack against Navigation Agents Authors: Jiani Liu, Yixin He, Lanlan Fan, Qidi Zhong, Yushi Cheng, Meng Zhang, Yanjiao Chen, Wenyuan Xu | Published: 2026-01-20 Indirect Prompt InjectionPerformance EvaluationAdversarial attack 2026.01.20 2026.01.22 Literature Database
Automatic Adjustment of HPA Parameters and Attack Prevention in Kubernetes Using Random Forests Authors: Hanlin Zhou, Huah Yong Chan, Jingfei Ni, Mengchun Wu, Qing Deng | Published: 2026-01-20 Performance Evaluation攻撃トラフィック管理機械学習応用 2026.01.20 2026.01.22 Literature Database
Privacy Enhanced PEFT: Tensor Train Decomposition Improves Privacy Utility Tradeoffs under DP-SGD Authors: Pradip Kunwar, Minh Vu, Maanak Gupta, Manish Bhattarai | Published: 2026-01-15 Privacy ProtectionDifferential PrivacyPerformance Evaluation 2026.01.15 2026.01.17 Literature Database
Evaluating Implicit Regulatory Compliance in LLM Tool Invocation via Logic-Guided Synthesis Authors: Da Song, Yuheng Huang, Boqi Chen, Tianshuo Cong, Randy Goebel, Lei Ma, Foutse Khomh | Published: 2026-01-13 LLM活用Prompt InjectionPerformance Evaluation 2026.01.13 2026.01.15 Literature Database
A Protocol-Aware P4 Pipeline for MQTT Security and Anomaly Mitigation in Edge IoT Systems Authors: Bui Ngoc Thanh Binh, Pham Hoai Luan, Le Vu Trung Duong, Vu Tuan Hai, Yasuhiko Nakashima | Published: 2026-01-12 Intrusion Detection SystemPerformance EvaluationAnomaly Detection Method 2026.01.12 2026.01.14 Literature Database
Memory-Based Malware Detection under Limited Data Conditions: A Comparative Evaluation of TabPFN and Ensemble Models Authors: Valentin Leroy, Shuvalaxmi Dass, Sharif Ullah | Published: 2026-01-12 Data Selection StrategyPerformance Evaluation機械学習応用 2026.01.12 2026.01.14 Literature Database
Defenses Against Prompt Attacks Learn Surface Heuristics Authors: Shawn Li, Chenxiao Yu, Zhiyu Ni, Hao Li, Charith Peris, Chaowei Xiao, Yue Zhao | Published: 2026-01-12 Prompt leakingPerformance EvaluationAdversarial Attack Analysis 2026.01.12 2026.01.14 Literature Database
Enhancing Cloud Network Resilience via a Robust LLM-Empowered Multi-Agent Reinforcement Learning Framework Authors: Yixiao Peng, Hao Hu, Feiyang Li, Xinye Cao, Yingchang Jiang, Jipeng Tang, Guoshun Nan, Yuling Liu | Published: 2026-01-12 LLM活用Security AssurancePerformance Evaluation 2026.01.12 2026.01.14 Literature Database
An Efficient Gradient-Based Inference Attack for Federated Learning Authors: Pablo Montaña-Fernández, Ines Ortega-Fernandez | Published: 2025-12-17 Privacy AnalysisPerformance EvaluationFederated Learning 2025.12.17 2025.12.19 Literature Database
SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports Authors: Sogol Masoumzadeh, Yufei Li, Shane McIntosh, Dániel Varró, Lili Wei | Published: 2025-12-17 Model DoSPerformance EvaluationDeep Learning Technology 2025.12.17 2025.12.19 Literature Database