Privacy-Preserving Mechanisms Enable Cheap Verifiable Inference of LLMs Authors: Arka Pal, Louai Zahran, William Gvozdjak, Akilesh Potti, Micah Goldblum | Published: 2026-02-19 Privacy Risk ManagementDifferential PrivacyDefense Method 2026.02.19 2026.02.21 Literature Database
Fail-Closed Alignment for Large Language Models Authors: Zachary Coalson, Beth Sohler, Aiden Gabriel, Sanghyun Hong | Published: 2026-02-19 Prompt InjectionRobustness EvaluationDefense Method 2026.02.19 2026.02.21 Literature Database
Sequential Membership Inference Attacks Authors: Thomas Michel, Debabrota Basu, Emilie Kaufmann | Published: 2026-02-18 Privacy Risk ManagementMembership InferenceDefense Method 2026.02.18 2026.02.20 Literature Database
A Content-Based Framework for Cybersecurity Refusal Decisions in Large Language Models Authors: Meirav Segal, Noa Linder, Omer Antverg, Gil Gekker, Tomer Fichman, Omri Bodenheimer, Edan Maor, Omer Nevo | Published: 2026-02-17 Prompt InjectionThreat ModelDefense Method 2026.02.17 2026.02.19 Literature Database
Context-Aware Hierarchical Learning: A Two-Step Paradigm towards Safer LLMs Authors: Tengyun Ma, Jiaqi Yao, Daojing He, Shihao Peng, Yu Li, Shaohui Liu, Zhuotao Tian | Published: 2025-12-03 セキュリティ考慮Ethical ConsiderationsDefense Method 2025.12.03 2025.12.05 Literature Database
Model Inversion Attacks Meet Cryptographic Fuzzy Extractors Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29 Membership InferenceModel InversionDefense Method 2025.10.29 2025.10.31 Literature Database
NetEcho: From Real-World Streaming Side-Channels to Full LLM Conversation Recovery Authors: Zheng Zhang, Guanlong Wu, Sen Deng, Shuai Wang, Yinqian Zhang | Published: 2025-10-29 Network Traffic AnalysisModel Extraction AttackDefense Method 2025.10.29 2025.10.31 Literature Database
An In-Depth Analysis of Cyber Attacks in Secured Platforms Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29 Cyber ThreatPrivacy LeakageDefense Method 2025.10.29 2025.10.31 Literature Database
Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs Authors: Man Hu, Xinyi Wu, Zuofeng Suo, Jinbo Feng, Linghui Meng, Yanhao Jia, Anh Tuan Luu, Shuai Zhao | Published: 2025-10-09 Prompt leaking推論に基づくバックドア攻撃Defense Method 2025.10.09 2025.10.11 Literature Database
DDoS Attacks in Cloud Computing: Detection and Prevention Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19 Resource Usage AnalysisAttack TypeDefense Method 2025.08.19 2025.08.21 Literature Database