BadTemplate: A Training-Free Backdoor Attack via Chat Template Against Large Language Models Authors: Zihan Wang, Hongwei Li, Rui Zhang, Wenbo Jiang, Guowen Xu | Published: 2026-02-05 LLM Performance Evaluationデータ毒性Large Language Model 2026.02.05 2026.02.07 Literature Database
SynAT: Enhancing Security Knowledge Bases via Automatic Synthesizing Attack Tree from Crowd Discussions Authors: Ziyou Jiang, Lin Shi, Guowei Yang, Xuyan Ma, Fenglong Li, Qing Wang | Published: 2026-02-05 LLM Performance EvaluationSafety of Data Generation攻撃ツリー合成 2026.02.05 2026.02.07 Literature Database
Hallucination-Resistant Security Planning with a Large Language Model Authors: Kim Hammar, Tansu Alpcan, Emil Lupu | Published: 2026-02-05 LLM Performance EvaluationHallucinationDetection of Hallucinations 2026.02.05 2026.02.07 Literature Database
How Few-shot Demonstrations Affect Prompt-based Defenses Against LLM Jailbreak Attacks Authors: Yanshu Wang, Shuaishuai Yang, Jingjing He, Tong Yang | Published: 2026-02-04 LLM Performance EvaluationPrompt InjectionLarge Language Model 2026.02.04 2026.02.06 Literature Database
LogicScan: An LLM-driven Framework for Detecting Business Logic Vulnerabilities in Smart Contracts Authors: Jiaqi Gao, Zijian Zhang, Yuqiang Sun, Ye Liu, Chengwei Liu, Han Liu, Yi Li, Yang Liu | Published: 2026-02-03 LLM Performance Evaluationスマートコントラクト攻撃Prompt leaking 2026.02.03 2026.02.05 Literature Database
Generalizable and Interpretable RF Fingerprinting with Shapelet-Enhanced Large Language Models Authors: Tianya Zhao, Junqing Zhang, Haowen Xu, Xiaoyan Sun, Jun Dai, Xuyu Wang | Published: 2026-02-03 LLM Performance EvaluationFingerprinting MethodPrompt validation 2026.02.03 2026.02.05 Literature Database
WorldCup Sampling for Multi-bit LLM Watermarking Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02 LLM Performance EvaluationAlgorithm DesignWatermarking 2026.02.02 2026.02.04 Literature Database
User-Centric Phishing Detection: A RAG and LLM-Based Approach Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29 LLM Performance EvaluationPoisoning attack on RAGユーザー中心のフィッシング検出 2026.01.29 2026.01.31 Literature Database
Eliciting Least-to-Most Reasoning for Phishing URL Detection Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.01.28 2026.01.30 Literature Database
GAVEL: Towards rule-based safety through activation monitoring Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27 LLM Performance EvaluationIndirect Prompt InjectionData Generation Method 2026.01.27 2026.01.29 Literature Database