Silent Guardians: Independent and Secure Decision Tree Evaluation Without Chatter Authors: Jinyuan Li, Liang Feng Zhang | Published: 2026-03-30 Privacy TechniqueModel Extraction AttackComputational Efficiency 2026.03.30 2026.04.01 Literature Database
Adversarial Attacks on Multimodal Large Language Models: A Comprehensive Survey Authors: Bhavuk Jain, Sercan Ö. Arık, Hardeo K. Thakur | Published: 2026-03-30 Model Extraction AttackLarge Language Model安全性に関連するマルチモーダルなアプローチ 2026.03.30 2026.04.01 Literature Database
Unveiling the Resilience of LLM-Enhanced Search Engines against Black-Hat SEO Manipulation Authors: Pei Chen, Geng Hong, Xinyi Wu, Mengying Wu, Zixuan Zhu, Mingxuan Liu, Baojun Liu, Mi Zhang, Min Yang | Published: 2026-03-26 Prompt leakingModel Extraction AttackLarge Language Model 2026.03.26 2026.03.28 Literature Database
Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12 Prompt InjectionModel Extraction AttackVulnerability Management 2026.03.12 2026.03.14 Literature Database
Kraken: Higher-order EM Side-Channel Attacks on DNNs in Near and Far Field Authors: Peter Horvath, Ilia Shumailov, Lukasz Chmielewski, Lejla Batina, Yuval Yarom | Published: 2026-03-03 LLM Performance EvaluationModel Extraction Attack 2026.03.03 2026.03.04 Literature Database
RobPI: Robust Private Inference against Malicious Client Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23 Model Extraction AttackAdversarial LearningDefense Mechanism 2026.02.23 2026.02.25 Literature Database
LLM-enabled Applications Require System-Level Threat Monitoring Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23 Poisoning attack on RAGModel Extraction Attack監視手法 2026.02.23 2026.02.25 Literature Database
SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23 Malware DetectionMalware Detection MethodModel Extraction Attack 2026.02.23 2026.02.25 Literature Database
Comparative Insights on Adversarial Machine Learning from Industry and Academia: A User-Study Approach Authors: Vishruti Kakkad, Paul Chung, Hanan Hibshi, Maverick Woo | Published: 2026-02-04 PoisoningModel Extraction Attack教育手法 2026.02.04 2026.02.06 Literature Database
Semantic Consensus Decoding: Backdoor Defense for Verilog Code Generation Authors: Guang Yang, Xing Hu, Xiang Chen, Xin Xia | Published: 2026-02-04 Security of Code GenerationBackdoor DetectionModel Extraction Attack 2026.02.04 2026.02.06 Literature Database