SERSEM: Selective Entropy-Weighted Scoring for Membership Inference in Code Language Models Authors: Kıvanç Kuzey Dikici, Serdar Kara, Semih Çağlar, Eray Tüzün, Sinem Sav | Published: 2026-04-01 2026.04.01 文献データベース
Multi-Agent LLM Governance for Safe Two-Timescale Reinforcement Learning in SDN-IoT Defense Authors: Saeid Jamshidi, Negar Shahabi, Foutse Khomh, Carol Fung, Mohammad Hamdaqa | Published: 2026-04-01 2026.04.01 文献データベース
Automated Framework to Evaluate and Harden LLM System Instructions against Encoding Attacks Authors: Anubhab Sahu, Diptisha Samanta, Reza Soosahabi | Published: 2026-04-01 2026.04.01 文献データベース
AutoMIA: Improved Baselines for Membership Inference Attack via Agentic Self-Exploration Authors: Ruhao Liu, Weiqi Huang, Qi Li, Xinchao Wang | Published: 2026-04-01 2026.04.01 文献データベース
LibScan: Smart Contract Library Misuse Detection with Iterative Feedback and Static Verification Authors: Yishun Wang, Wenkai Li, Xiaoqi Li, Zongwei Li, Lei Xie, Yuqing Zhang | Published: 2026-04-01 2026.04.01 文献データベース
Secure Forgetting: A Framework for Privacy-Driven Unlearning in Large Language Model (LLM)-Based Agents Authors: Dayong Ye, Tainqing Zhu, Congcong Zhu, Feng He, Qi He, Shang Wang, Bo Liu, Wanlei Zhou | Published: 2026-04-01 2026.04.01 文献データベース
Architecting Secure AI Agents: Perspectives on System-Level Defenses Against Indirect Prompt Injection Attacks Authors: Chong Xiang, Drew Zagieboylo, Shaona Ghosh, Sanjay Kariyappa, Kai Greshake, Hanshen Xiao, Chaowei Xiao, G. Edward Suh | Published: 2026-03-31 2026.03.31 文献データベース
Downsides of Smartness Across Edge-Cloud Continuum in Modern Industry Authors: Akhil Gupta Chigullapally, Sharvan Vittala, Razin Farhan Hussian, Mohsen Amini Salehi | Published: 2026-03-31 2026.03.31 文献データベース
Software Vulnerability Detection Using a Lightweight Graph Neural Network Authors: Miles Farmer, Ekincan Ufuktepe, Anne Watson, Hialo Muniz Carvalho, Vadim Okun, Zineb Maasaoui, Kannappan Palaniappan | Published: 2026-03-31 2026.03.31 文献データベース
Safeguarding LLMs Against Misuse and AI-Driven Malware Using Steganographic Canaries Authors: Md Raz, Venkata Sai Charan Putrevu, Meet Udeshi, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2026-03-30 2026.03.30 文献データベース