From IOCs to Regex: Automating CTI Operationalization for SOC with LLMs Authors: Pei-Yu Tseng, Lan Zhang, ZihDwo Yeh, Xiaoyan Sun, Xushu Dai, Peng Liu | Published: 2026-04-14 2026.04.14 文献データベース
TimeMark: A Trustworthy Time Watermarking Framework for Exact Generation-Time Recovery from AIGC Authors: Shangkun Che, Silin Du, Ge Gao | Published: 2026-04-14 2026.04.14 文献データベース
Fully Homomorphic Encryption on Llama 3 model for privacy preserving LLM inference Authors: Anes Abdennebi, Nadjia Kara, Laaziz Lahlou | Published: 2026-04-14 2026.04.14 文献データベース
ClawGuard: A Runtime Security Framework for Tool-Augmented LLM Agents Against Indirect Prompt Injection Authors: Wei Zhao, Zhe Li, Peixin Zhang, Jun Sun | Published: 2026-04-13 2026.04.13 文献データベース
Towards Automated Pentesting with Large Language Models Authors: Ricardo Bessa, Rui Claro, João Trindade, João Lourenço | Published: 2026-04-13 2026.04.13 文献データベース
A Synthetic Conversational Smishing Dataset for Social Engineering Detection Authors: Carl Lochstampfor, Ayan Roy | Published: 2026-04-13 2026.04.13 文献データベース
GPU Acceleration of Sparse Fully Homomorphic Encrypted DNNs Authors: Lara D'Agata, Carlos Agulló-Domingo, Óscar Vera-López, Kaustubh Shivdikar, Ardhi W. B. Yudha, Ferhat Yaman, David Kaeli, José L. Abellán, Ian Colbert, José Cano | Published: 2026-04-13 2026.04.13 文献データベース
RLSpoofer: A Lightweight Evaluator for LLM Watermark Spoofing Resilience Authors: Hanbo Huang, Xuan Gong, Yiran Zhang, Hao Zheng, Shiyu Liang | Published: 2026-04-13 2026.04.13 文献データベース
RedShell: A Generative AI-Based Approach to Ethical Hacking Authors: Ricardo Bessa, Rui Claro, João Trindade, João Lourenço | Published: 2026-04-13 2026.04.13 文献データベース
The Salami Slicing Threat: Exploiting Cumulative Risks in LLM Systems Authors: Yihao Zhang, Kai Wang, Jiangrong Wu, Haolin Wu, Yuxuan Zhou, Zeming Wei, Dongxian Wu, Xun Chen, Jun Sun, Meng Sun | Published: 2026-04-13 2026.04.13 文献データベース