Hallucination-Resistant Security Planning with a Large Language Model Authors: Kim Hammar, Tansu Alpcan, Emil Lupu | Published: 2026-02-05 LLM Performance EvaluationHallucinationDetection of Hallucinations 2026.02.05 2026.02.07 Literature Database
How Few-shot Demonstrations Affect Prompt-based Defenses Against LLM Jailbreak Attacks Authors: Yanshu Wang, Shuaishuai Yang, Jingjing He, Tong Yang | Published: 2026-02-04 LLM Performance EvaluationPrompt InjectionLarge Language Model 2026.02.04 2026.02.06 Literature Database
LogicScan: An LLM-driven Framework for Detecting Business Logic Vulnerabilities in Smart Contracts Authors: Jiaqi Gao, Zijian Zhang, Yuqiang Sun, Ye Liu, Chengwei Liu, Han Liu, Yi Li, Yang Liu | Published: 2026-02-03 LLM Performance Evaluationスマートコントラクト攻撃Prompt leaking 2026.02.03 2026.02.05 Literature Database
Generalizable and Interpretable RF Fingerprinting with Shapelet-Enhanced Large Language Models Authors: Tianya Zhao, Junqing Zhang, Haowen Xu, Xiaoyan Sun, Jun Dai, Xuyu Wang | Published: 2026-02-03 LLM Performance EvaluationFingerprinting MethodPrompt validation 2026.02.03 2026.02.05 Literature Database
WorldCup Sampling for Multi-bit LLM Watermarking Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02 LLM Performance EvaluationAlgorithm DesignWatermarking 2026.02.02 2026.02.04 Literature Database
User-Centric Phishing Detection: A RAG and LLM-Based Approach Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29 LLM Performance EvaluationPoisoning attack on RAGユーザー中心のフィッシング検出 2026.01.29 2026.01.31 Literature Database
Eliciting Least-to-Most Reasoning for Phishing URL Detection Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.01.28 2026.01.30 Literature Database
GAVEL: Towards rule-based safety through activation monitoring Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27 LLM Performance EvaluationIndirect Prompt InjectionData Generation Method 2026.01.27 2026.01.29 Literature Database
Towards a standardized methodology and dataset for evaluating LLM-based digital forensic timeline analysis Authors: Hudan Studiawan, Frank Breitinger, Mark Scanlon | Published: 2025-05-06 LLM Performance EvaluationLarge Language ModelEvaluation Method 2025.05.06 2025.05.27 Literature Database
LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems Authors: Yazan Otoum, Arghavan Asad, Amiya Nayak | Published: 2025-05-01 | Updated: 2025-05-13 Bias Detection in AI OutputLLM Performance EvaluationPrompt Injection 2025.05.01 2025.05.27 Literature Database