Differentially Private and Communication Efficient Large Language Model Split Inference via Stochastic Quantization and Soft Prompt Authors: Yujie Gu, Richeng Jin, Xiaoyu Ji, Yier Jin, Wenyuan Xu | Published: 2026-02-12 Privacy AssurancePrompt InjectionPrompt leaking 2026.02.12 2026.02.14 Literature Database
Focus Session: LLM4PQC — An Agentic Framework for Accurate and Efficient Synthesis of PQC Cores Authors: Buddhi Perera, Zeng Wang, Weihua Xiao, Mohammed Nabeel, Ozgur Sinanoglu, Johann Knechtel, Ramesh Karri | Published: 2026-02-10 LLM Performance EvaluationHardware AcceleratorPrompt leaking 2026.02.10 2026.02.12 Literature Database
LogicScan: An LLM-driven Framework for Detecting Business Logic Vulnerabilities in Smart Contracts Authors: Jiaqi Gao, Zijian Zhang, Yuqiang Sun, Ye Liu, Chengwei Liu, Han Liu, Yi Li, Yang Liu | Published: 2026-02-03 LLM Performance Evaluationスマートコントラクト攻撃Prompt leaking 2026.02.03 2026.02.05 Literature Database
ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses Authors: Ningyuan He, Ronghong Huang, Qianqian Tang, Hongyu Wang, Xianghang Mi, Shanqing Guo | Published: 2026-01-29 データ毒性攻撃Prompt leakingModel Extraction Attack 2026.01.29 2026.01.31 Literature Database
Eliciting Least-to-Most Reasoning for Phishing URL Detection Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.01.28 2026.01.30 Literature Database
Scaling up Privacy-Preserving ML: A CKKS Implementation of Llama-2-7B Authors: Jaiyoung Park, Sejin Park, Jai Hyun Park, Jung Ho Ahn, Jung Hee Cheon, Guillaume Hanrot, Jung Woo Kim, Minje Park, Damien Stehlé | Published: 2026-01-26 LLM活用Prompt leaking線形代数最適化 2026.01.26 2026.01.28 Literature Database
HardSecBench: Benchmarking the Security Awareness of LLMs for Hardware Code Generation Authors: Qirui Chen, Jingxian Shuai, Shuangwu Chen, Shenghao Ye, Zijian Wen, Xufei Su, Jie Jin, Jiangming Li, Jun Chen, Xiaobin Tan, Jian Yang | Published: 2026-01-20 コード生成手法Security AssurancePrompt leaking 2026.01.20 2026.01.22 Literature Database
Defenses Against Prompt Attacks Learn Surface Heuristics Authors: Shawn Li, Chenxiao Yu, Zhiyu Ni, Hao Li, Charith Peris, Chaowei Xiao, Yue Zhao | Published: 2026-01-12 Prompt leakingPerformance EvaluationAdversarial Attack Analysis 2026.01.12 2026.01.14 Literature Database
Securing the AI Supply Chain: What Can We Learn From Developer-Reported Security Issues and Solutions of AI Projects? Authors: The Anh Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2025-12-29 Security Analysis MethodData-Driven Vulnerability AssessmentPrompt leaking 2025.12.29 2025.12.31 Literature Database
GateBreaker: Gate-Guided Attacks on Mixture-of-Expert LLMs Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-12-24 Sparse ModelPrompt leaking安全性に関連するマルチモーダルなアプローチ 2025.12.24 2025.12.26 Literature Database