Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10 2026.02.10 文献データベース
When Handshakes Tell the Truth: Detecting Web Bad Bots via TLS Fingerprints Authors: Ghalia Jarad, Kemal Bicakci | Published: 2026-02-10 2026.02.10 文献データベース
ReSIM: Re-ranking Binary Similarity Embeddings to Improve Function Search Performance Authors: Gianluca Capozzi, Anna Paola Giancaspro, Fabio Petroni, Leonardo Querzoni, Giuseppe Antonio Di Luna | Published: 2026-02-10 2026.02.10 文献データベース
A Behavioral Fingerprint for Large Language Models: Provenance Tracking via Refusal Vectors Authors: Zhenyu Xu, Victor S. Sheng | Published: 2026-02-10 2026.02.10 文献データベース
LLMAC: A Global and Explainable Access Control Framework with Large Language Model Authors: Sharif Noor Zisad, Ragib Hasan | Published: 2026-02-10 2026.02.10 文献データベース
CIC-Trap4Phish: A Unified Multi-Format Dataset for Phishing and Quishing Attachment Detection Authors: Fatemeh Nejati, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali A. Ghorbani, Sajjad Dadkhah | Published: 2026-02-09 2026.02.09 文献データベース
Is Reasoning Capability Enough for Safety in Long-Context Language Models? Authors: Yu Fu, Haz Sameen Shahgir, Huanli Gong, Zhipeng Wei, N. Benjamin Erichson, Yue Dong | Published: 2026-02-09 2026.02.09 文献データベース
HoGS: Homophily-Oriented Graph Synthesis for Local Differentially Private GNN Training Authors: Wen Xu, Zhetao Li, Yong Xiao, Pengpeng Qiao, Mianxiong Dong, Kaoru Ota | Published: 2026-02-09 2026.02.09 文献データベース
Empirical Evaluation of SMOTE in Android Malware Detection with Machine Learning: Challenges and Performance in CICMalDroid 2020 Authors: Diego Ferreira Duarte, Andre Augusto Bortoli | Published: 2026-02-09 2026.02.09 文献データベース
Large Language Lobotomy: Jailbreaking Mixture-of-Experts via Expert Silencing Authors: Jona te Lintelo, Lichao Wu, Stjepan Picek | Published: 2026-02-09 2026.02.09 文献データベース