RobPI: Robust Private Inference against Malicious Client Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23 2026.02.23 文献データベース
Dirichlet Scale Mixture Priors for Bayesian Neural Networks Authors: August Arnstad, Leiv Rønneberg, Geir Storvik | Published: 2026-02-23 2026.02.23 文献データベース
LLM-enabled Applications Require System-Level Threat Monitoring Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23 2026.02.23 文献データベース
An Explainable Memory Forensics Approach for Malware Analysis Authors: Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto | Published: 2026-02-23 2026.02.23 文献データベース
SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23 2026.02.23 文献データベース
Efficient Multi-Party Secure Comparison over Different Domains with Preprocessing Assistance Authors: Kaiwen Wang, Xiaolin Chang, Yuehan Dong, Ruichen Zhang | Published: 2026-02-23 2026.02.23 文献データベース
Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23 2026.02.23 文献データベース
Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments Authors: Kunal Mukherjee | Published: 2026-02-23 2026.02.23 文献データベース
Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19 2026.02.19 文献データベース
What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else? Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19 2026.02.19 文献データベース