Do Agents Dream of Root Shells? Partial-Credit Evaluation of LLM Agents in Capture The Flag Challenges Authors: Ali Al-Kaswan, Maksim Plotnikov, Maxim Hájek, Roland Vízner, Arie van Deursen, Maliheh Izadi | Published: 2026-04-21 2026.04.21 文献データベース
DP-FlogTinyLLM: Differentially private federated log anomaly detection using Tiny LLMs Authors: Isaiah Thompson, Tanmay Sen, Ritwik Bhattacharya | Published: 2026-04-21 2026.04.21 文献データベース
ProjLens: Unveiling the Role of Projectors in Multimodal Model Safety Authors: Kun Wang, Cheng Qian, Miao Yu, Lilan Peng, Liang Lin, Jiaming Zhang, Tianyu Zhang, Yu Cheng, Yang Wang | Published: 2026-04-21 2026.04.21 文献データベース
SAGE: Signal-Amplified Guided Embeddings for LLM-based Vulnerability Detection Authors: Zhengyang Shan, Xu Qian, Jiayun Xin, Minghui Xu, Yue Zhang, Zhen Yang, Hao Wu, Xiuzhen Cheng | Published: 2026-04-21 2026.04.21 文献データベース
Beyond Pattern Matching: Seven Cross-Domain Techniques for Prompt Injection Detection Authors: Thamilvendhan Munirathinam | Published: 2026-04-20 2026.04.20 文献データベース
AgenTEE: Confidential LLM Agent Execution on Edge Devices Authors: Sina Abdollahi, Mohammad M Maheri, Javad Forough, Amir Al Sadi, Josh Millar, David Kotz, Marios Kogias, Hamed Haddadi | Published: 2026-04-20 2026.04.20 文献データベース
RAVEN: Retrieval-Augmented Vulnerability Exploration Network for Memory Corruption Analysis in User Code and Binary Programs Authors: Parteek Jamwal, Minghao Shao, Boyuan Chen, Achyuta Muthuvelan, Asini Subanya, Boubacar Ballo, Kashish Satija, Mariam Shafey, Mohamed Mahmoud, Moncif Dahaji Bouffi, Pasindu Wickramasinghe, Siyona Goel, Yaakulya Sabbani, Hakim Hacid, Mthandazo Ndhlovu, Eleanna Kafeza, Sanjay Rawat, Muhammad Shafique | Published: 2026-04-20 2026.04.20 文献データベース
TitanCA: Lessons from Orchestrating LLM Agents to Discover 100+ CVEs Authors: Ting Zhang, Yikun Li, Chengran Yang, Ratnadira Widyasari, Yue Liu, Ngoc Tan Bui, Phuc Thanh Nguyen, Yan Naing Tun, Ivana Clairine Irsan, Huu Hung Nguyen, Huihui Huang, Jinfeng Jiang, Lwin Khin Shar, Eng Lieh Ouh, David Lo, Hong Jin Kang, Yide Yin, Wen Bin Leow | Published: 2026-04-20 2026.04.20 文献データベース
Privacy-Preserving Product-Quantized Approximate Nearest Neighbor Search Framework for Large-scale Datasets via A Hybrid of Fully Homomorphic Encryption and Trusted Execution Environment Authors: Shozo Saeki, Minoru Kawahara, Hirohisa Aman | Published: 2026-04-20 2026.04.20 文献データベース
Understanding Secret Leakage Risks in Code LLMs: A Tokenization Perspective Authors: Meifang Chen, Zhe Yang, Huang Nianchen, Yizhan Huang, Yichen Li, Zihan Li, Michael R. Lyu | Published: 2026-04-20 2026.04.20 文献データベース