Your LLM Agent Can Leak Your Data: Data Exfiltration via Backdoored Tool Use Authors: Wuyang Zhang, Shichao Pei | Published: 2026-04-07 2026.04.07 文献データベース
Attribution-Driven Explainable Intrusion Detection with Encoder-Based Large Language Models Authors: Umesh Biswas, Shafqat Hasan, Syed Mohammed Farhan, Nisha Pillai, Charan Gudla | Published: 2026-04-07 2026.04.07 文献データベース
RuleForge: Automated Generation and Validation for Web Vulnerability Detection at Scale Authors: Ayush Garg, Sophia Hager, Jacob Montiel, Aditya Tiwari, Michael Gentile, Zach Reavis, David Magnotti, Wayne Fullen | Published: 2026-04-02 2026.04.02 文献データベース
Combating Data Laundering in LLM Training Authors: Muxing Li, Zesheng Ye, Sharon Li, Feng Liu | Published: 2026-04-02 2026.04.02 文献データベース
Assertain: Automated Security Assertion Generation Using Large Language Models Authors: Shams Tarek, Dipayan Saha, Khan Thamid Hasan, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-04-02 2026.04.02 文献データベース
AI-Assisted Hardware Security Verification: A Survey and AI Accelerator Case Study Authors: Khan Thamid Hasan, Md Ajoad Hasan, Nashmin Alam, Md. Touhidul Islam, Upoma Das, Farimah Farahmandi | Published: 2026-04-02 2026.04.02 文献データベース
AgentWatcher: A Rule-based Prompt Injection Monitor Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2026-04-01 2026.04.01 文献データベース
SERSEM: Selective Entropy-Weighted Scoring for Membership Inference in Code Language Models Authors: Kıvanç Kuzey Dikici, Serdar Kara, Semih Çağlar, Eray Tüzün, Sinem Sav | Published: 2026-04-01 2026.04.01 文献データベース
Multi-Agent LLM Governance for Safe Two-Timescale Reinforcement Learning in SDN-IoT Defense Authors: Saeid Jamshidi, Negar Shahabi, Foutse Khomh, Carol Fung, Mohammad Hamdaqa | Published: 2026-04-01 2026.04.01 文献データベース
Automated Framework to Evaluate and Harden LLM System Instructions against Encoding Attacks Authors: Anubhab Sahu, Diptisha Samanta, Reza Soosahabi | Published: 2026-04-01 2026.04.01 文献データベース