Malware Detection Through Memory Analysis Authors: Sarah Nassar | Published: 2026-02-02 2026.02.02 文献データベース
Co-RedTeam: Orchestrated Security Discovery and Exploitation with LLM Agents Authors: Pengfei He, Ash Fox, Lesly Miculicich, Stefan Friedli, Daniel Fabian, Burak Gokturk, Jiliang Tang, Chen-Yu Lee, Tomas Pfister, Long T. Le | Published: 2026-02-02 2026.02.02 文献データベース
Human Society-Inspired Approaches to Agentic AI Security: The 4C Framework Authors: Alsharif Abuadbba, Nazatul Sultan, Surya Nepal, Sanjay Jha | Published: 2026-02-02 2026.02.02 文献データベース
RedVisor: Reasoning-Aware Prompt Injection Defense via Zero-Copy KV Cache Reuse Authors: Mingrui Liu, Sixiao Zhang, Cheng Long, Kwok-Yan Lam | Published: 2026-02-02 2026.02.02 文献データベース
WorldCup Sampling for Multi-bit LLM Watermarking Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02 2026.02.02 文献データベース
AI-Assisted Adaptive Rendering for High-Frequency Security Telemetry in Web Interfaces Authors: Mona Rajhans | Published: 2026-02-02 2026.02.02 文献データベース
Efficient Softmax Reformulation for Homomorphic Encryption via Moment Generating Function Authors: Hanjun Park, Byeong-Seo Min, Jiheon Woo, Min-Wook Jeong, Jongho Shin, Yongwoo Lee, Young-Sik Kim, Yongjune Kim | Published: 2026-02-02 2026.02.02 文献データベース
Hardware-Triggered Backdoors Authors: Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck | Published: 2026-01-29 2026.01.29 文献データベース
LoRA and Privacy: When Random Projections Help (and When They Don’t) Authors: Yaxi Hu, Johanna Düngler, Bernhard Schölkopf, Amartya Sanyal | Published: 2026-01-29 2026.01.29 文献データベース
FIT: Defying Catastrophic Forgetting in Continual LLM Unlearning Authors: Xiaoyu Xu, Minxin Du, Kun Fang, Zi Liang, Yaxin Xiao, Zhicong Huang, Cheng Hong, Qingqing Ye, Haibo Hu | Published: 2026-01-29 2026.01.29 文献データベース