LLMs Can Unlearn Refusal with Only 1,000 Benign Samples Authors: Yangyang Guo, Ziwei Xu, Si Liu, Zhiming Zheng, Mohan Kankanhalli | Published: 2026-01-27 LLM活用Large Language Model安全性評価 2026.01.27 2026.01.29 Literature Database
AgenticSCR: An Autonomous Agentic Secure Code Review for Immature Vulnerabilities Detection Authors: Wachiraphan Charoenwet, Kla Tantithamthavorn, Patanamon Thongtanunam, Hong Yi Lin, Minwoo Jeong, Ming Wu | Published: 2026-01-27 LLM活用Security Assurance脆弱性検出手法 2026.01.27 2026.01.29 Literature Database
Thought-Transfer: Indirect Targeted Poisoning Attacks on Chain-of-Thought Reasoning Models Authors: Harsh Chaudhari, Ethan Rathbum, Hanna Foerster, Jamie Hayes, Matthew Jagielski, Milad Nasr, Ilia Shumailov, Alina Oprea | Published: 2026-01-27 LLM活用Data Contamination DetectionCalculation of Output Harmfulness 2026.01.27 2026.01.29 Literature Database
$α^3$-SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks Authors: Mohamed Amine Ferrag, Abderrahmane Lakas, Merouane Debbah | Published: 2026-01-26 LLM活用Security AssurancePrompt Injection 2026.01.26 2026.01.28 Literature Database
Scaling up Privacy-Preserving ML: A CKKS Implementation of Llama-2-7B Authors: Jaiyoung Park, Sejin Park, Jai Hyun Park, Jung Ho Ahn, Jung Hee Cheon, Guillaume Hanrot, Jung Woo Kim, Minje Park, Damien Stehlé | Published: 2026-01-26 LLM活用Prompt leaking線形代数最適化 2026.01.26 2026.01.28 Literature Database
Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents Authors: Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy | Published: 2026-01-26 LLM活用RAGSecurity Assurance 2026.01.26 2026.01.28 Literature Database
Data-Free Privacy-Preserving for LLMs via Model Inversion and Selective Unlearning Authors: Xinjie Zhou, Zhihui Yang, Lechao Cheng, Sai Wu, Gang Chen | Published: 2026-01-22 LLM活用Privacy ProtectionDifferential Privacy 2026.01.22 2026.01.24 Literature Database
Lightweight LLMs for Network Attack Detection in IoT Networks Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21 IoT Security RisksLLM活用Poisoning attack on RAG 2026.01.21 2026.01.23 Literature Database
ReasAlign: Reasoning Enhanced Safety Alignment against Prompt Injection Attack Authors: Hao Li, Yankai Yang, G. Edward Suh, Ning Zhang, Chaowei Xiao | Published: 2026-01-15 LLM活用Indirect Prompt InjectionPrompt Injection 2026.01.15 2026.01.17 Literature Database
SoK: Privacy-aware LLM in Healthcare: Threat Model, Privacy Techniques, Challenges and Recommendations Authors: Mohoshin Ara Tahera, Karamveer Singh Sidhu, Shuvalaxmi Dass, Sajal Saha | Published: 2026-01-15 LLM活用Privacy ProtectionDifferential Privacy 2026.01.15 2026.01.17 Literature Database