Benchmarking Safety Risks of Knowledge-Intensive Reasoning under Malicious Knowledge Editing Authors: Qinghua Mao, Xi Lin, Jinze Gu, Jun Wu, Siyuan Li, Yuliang Chen | Published: 2026-05-11 2026.05.11 文献データベース
Usability as a Weapon: Attacking the Safety of LLM-Based Code Generation via Usability Requirements Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Yechao Zhang, Yating Liu, Fengyuan Xu, Sheng Zhong | Published: 2026-05-11 2026.05.11 文献データベース
Sketch-based Access Control: A Multimodal Interface for Translating User Preferences into Intent-Aligned Policies Authors: Kyzyl Monteiro, Sauvik Das | Published: 2026-05-11 2026.05.11 文献データベース
Probabilistic-bit Guided CDCL for SAT Solving using Ising Consensus Assumptions Authors: Melki Bino | Published: 2026-05-05 2026.05.05 文献データベース
Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software Authors: Shravya Kanchi, Xiaoyan Zang, Ying Zhang, Danfeng Yao, Na Meng | Published: 2026-05-05 2026.05.05 文献データベース
KVerus: Scalable and Resilient Formal Verification Proof Generation for Rust Code Authors: Yuwei Liu, Xinyi Wan, Yanhao Wang, Minghua Wang, Lin Huang, Tao Wei | Published: 2026-05-05 2026.05.05 文献データベース
GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer Authors: Chris S. Lin, Yuqin Yan, Guozhen Ding, Joyce Qu, Joseph Zhu, David Lie, Gururaj Saileshwar | Published: 2026-05-05 2026.05.05 文献データベース
Bandits attack function optimization Authors: Philippe Preux, Rémi Munos, Michal Valko | Published: 2026-05-05 2026.05.05 文献データベース
Exposing LLM Safety Gaps Through Mathematical Encoding:New Attacks and Systematic Analysis Authors: Haoyu Zhang, Mohammad Zandsalimy, Shanu Sushmita | Published: 2026-05-05 2026.05.05 文献データベース
ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection Authors: Shihao Weng, Yang Feng, Jinrui Zhang, Xiaofei Xie, Jiongchi Yu, Jia Liu | Published: 2026-05-05 2026.05.05 文献データベース