Leveraging Large Language Models for Trustworthiness Assessment of Web Applications Authors: Oleksandr Yarotskyi, José D'Abruzzo Pereira, João R. Campos | Published: 2026-03-24 セキュアコーディングPrompt leakingEvaluation Method 2026.03.24 2026.03.26 Literature Database
Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks Authors: Islam Debicha, Tayeb Kenaza, Ishak Charfi, Salah Mosbah, Mehdi Sehaki, Jean-Michel Dricot | Published: 2026-03-24 Dataset evaluationAdversarial Example DetectionEvaluation Method 2026.03.24 2026.03.26 Literature Database
An Experimental Study of Machine Learning-Based Intrusion Detection for OPC UA over Industrial Private 5G Networks Authors: Song Son Ha, Kunal Singh, Florian Foerster, Henry Beuster, Tim Kittel, Dominik Merli, Gerd Scholl | Published: 2026-03-24 Machine Learning ApplicationFeature ExtractionEvaluation Method 2026.03.24 2026.03.26 Literature Database
Not All Tokens Are Created Equal: Query-Efficient Jailbreak Fuzzing for LLMs Authors: Wenyu Chen, Xiangtao Meng, Chuanchao Zang, Li Wang, Xinyu Gao, Jianing Wang, Peng Zhan, Zheng Li, Shanqing Guo | Published: 2026-03-24 LLM Performance EvaluationPrompt InjectionEvaluation Method 2026.03.24 2026.03.26 Literature Database
A Critical Review on the Effectiveness and Privacy Threats of Membership Inference Attacks Authors: Najeeb Jebreel, David Sánchez, Josep Domingo-Ferrer | Published: 2026-03-24 Privacy LeakageMembership InferenceEvaluation Method 2026.03.24 2026.03.26 Literature Database
Beyond Theoretical Bounds: Empirical Privacy Loss Calibration for Text Rewriting Under Local Differential Privacy Authors: Weijun Li, Arnaud Grivet Sébert, Qiongkai Xu, Annabelle McIver, Mark Dras | Published: 2026-03-24 Dataset evaluationDifferential PrivacyEvaluation Method 2026.03.24 2026.03.26 Literature Database
Privacy-Preserving EHR Data Transformation via Geometric Operators: A Human-AI Co-Design Technical Report Authors: Maolin Wang, Beining Bao, Gan Yuan, Hongyu Chen, Bingkun Zhao, Baoshuo Kan, Jiming Xu, Qi Shi, Yinggong Zhao, Yao Wang, Wei Ying Ma, Jun Yan | Published: 2026-03-24 Data Privacy AssessmentPrivacy LeakageEvaluation Method 2026.03.24 2026.03.26 Literature Database
CIPL: A Target-Independent Framework for Channel-Inversion Privacy Leakage in Agents Authors: Tao Huang, Chen Hou, Jiayang Meng | Published: 2026-03-24 Privacy LeakageModel InversionEvaluation Method 2026.03.24 2026.03.26 Literature Database
Structured Visual Narratives Undermine Safety Alignment in Multimodal Large Language Models Authors: Rui Yang Tan, Yujia Hu, Roy Ka-Wei Lee | Published: 2026-03-23 マルチモーダル安全性Large Language ModelEvaluation Method 2026.03.23 2026.03.25 Literature Database
Auditing MCP Servers for Over-Privileged Tool Capabilities Authors: Charoes Huang, Xin Huang, Amin Milani Fard | Published: 2026-03-23 Dynamic AnalysisEvaluation MethodStatic Analysis 2026.03.23 2026.03.25 Literature Database