Defense Method

Privacy-Preserving Mechanisms Enable Cheap Verifiable Inference of LLMs

Authors: Arka Pal, Louai Zahran, William Gvozdjak, Akilesh Potti, Micah Goldblum | Published: 2026-02-19
Privacy Risk Management
Differential Privacy
Defense Method

Fail-Closed Alignment for Large Language Models

Authors: Zachary Coalson, Beth Sohler, Aiden Gabriel, Sanghyun Hong | Published: 2026-02-19
Prompt Injection
Robustness Evaluation
Defense Method

Sequential Membership Inference Attacks

Authors: Thomas Michel, Debabrota Basu, Emilie Kaufmann | Published: 2026-02-18
Privacy Risk Management
Membership Inference
Defense Method

A Content-Based Framework for Cybersecurity Refusal Decisions in Large Language Models

Authors: Meirav Segal, Noa Linder, Omer Antverg, Gil Gekker, Tomer Fichman, Omri Bodenheimer, Edan Maor, Omer Nevo | Published: 2026-02-17
Prompt Injection
Threat Model
Defense Method

Context-Aware Hierarchical Learning: A Two-Step Paradigm towards Safer LLMs

Authors: Tengyun Ma, Jiaqi Yao, Daojing He, Shihao Peng, Yu Li, Shaohui Liu, Zhuotao Tian | Published: 2025-12-03
セキュリティ考慮
Ethical Considerations
Defense Method

Model Inversion Attacks Meet Cryptographic Fuzzy Extractors

Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29
Membership Inference
Model Inversion
Defense Method

NetEcho: From Real-World Streaming Side-Channels to Full LLM Conversation Recovery

Authors: Zheng Zhang, Guanlong Wu, Sen Deng, Shuai Wang, Yinqian Zhang | Published: 2025-10-29
Network Traffic Analysis
Model Extraction Attack
Defense Method

An In-Depth Analysis of Cyber Attacks in Secured Platforms

Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29
Cyber Threat
Privacy Leakage
Defense Method

Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs

Authors: Man Hu, Xinyi Wu, Zuofeng Suo, Jinbo Feng, Linghui Meng, Yanhao Jia, Anh Tuan Luu, Shuai Zhao | Published: 2025-10-09
Prompt leaking
推論に基づくバックドア攻撃
Defense Method

DDoS Attacks in Cloud Computing: Detection and Prevention

Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19
Resource Usage Analysis
Attack Type
Defense Method