Towards the Development of an LLM-Based Methodology for Automated Security Profiling in Compliance with Ukrainian Cybersecurity Regulations Authors: Daniil Shafranskyi, Iryna Stopochkina, Mykola Ilin | Published: 2026-04-07 2026.04.07 文献データベース
AttnDiff: Attention-based Differential Fingerprinting for Large Language Models Authors: Haobo Zhang, Zhenhua Xu, Junxian Li, Shangfeng Sheng, Dezhang Kong, Meng Han | Published: 2026-04-07 2026.04.07 文献データベース
MA-IDS: Multi-Agent RAG Framework for IoT Network Intrusion Detection with an Experience Library Authors: Md Shamimul Islam, Luis G. Jaimes, Ayesha S. Dina | Published: 2026-04-07 2026.04.07 文献データベース
Your LLM Agent Can Leak Your Data: Data Exfiltration via Backdoored Tool Use Authors: Wuyang Zhang, Shichao Pei | Published: 2026-04-07 2026.04.07 文献データベース
Attribution-Driven Explainable Intrusion Detection with Encoder-Based Large Language Models Authors: Umesh Biswas, Shafqat Hasan, Syed Mohammed Farhan, Nisha Pillai, Charan Gudla | Published: 2026-04-07 2026.04.07 文献データベース
RuleForge: Automated Generation and Validation for Web Vulnerability Detection at Scale Authors: Ayush Garg, Sophia Hager, Jacob Montiel, Aditya Tiwari, Michael Gentile, Zach Reavis, David Magnotti, Wayne Fullen | Published: 2026-04-02 2026.04.02 文献データベース
Combating Data Laundering in LLM Training Authors: Muxing Li, Zesheng Ye, Sharon Li, Feng Liu | Published: 2026-04-02 2026.04.02 文献データベース
Assertain: Automated Security Assertion Generation Using Large Language Models Authors: Shams Tarek, Dipayan Saha, Khan Thamid Hasan, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-04-02 2026.04.02 文献データベース
AI-Assisted Hardware Security Verification: A Survey and AI Accelerator Case Study Authors: Khan Thamid Hasan, Md Ajoad Hasan, Nashmin Alam, Md. Touhidul Islam, Upoma Das, Farimah Farahmandi | Published: 2026-04-02 2026.04.02 文献データベース
AgentWatcher: A Rule-based Prompt Injection Monitor Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2026-04-01 2026.04.01 文献データベース