文献データベース

Full-Stack Knowledge Graph and LLM Framework for Post-Quantum Cyber Readiness

Authors: Rasmus Erlemann, Charles Colyer Morris, Sanjyot Sathe | Published: 2026-01-07
データ駆動型脆弱性評価
知識グラフ設計
脆弱性優先順位付け

SLIM: Stealthy Low-Coverage Black-Box Watermarking via Latent-Space Confusion Zones

Authors: Hengyu Wu, Yang Cao | Published: 2026-01-06
プロンプトの検証
生成AI向け電子透かし
透かし評価

LLMs, You Can Evaluate It! Design of Multi-perspective Report Evaluation for Security Operation Centers

Authors: Hiroyuki Okada, Tatsumi Oba, Naoto Yanai | Published: 2026-01-06
LLM活用
セキュリティ分析手法
ユーザー体験評価

JPU: Bridging Jailbreak Defense and Unlearning via On-Policy Path Rectification

Authors: Xi Wang, Songlei Jian, Shasha Li, Xiaopeng Li, Zhaoye Li, Bin Ji, Baosheng Wang, Jie Yu | Published: 2026-01-06
プロンプトインジェクション
モデル抽出攻撃
敵対的攻撃検出

Window-based Membership Inference Attacks Against Fine-tuned Large Language Models

Authors: Yuetian Chen, Yuntao Du, Kaiyuan Zhang, Ashish Kundu, Charles Fleming, Bruno Ribeiro, Ninghui Li | Published: 2026-01-06
アンサンブル学習
プライバシー保護技術
メンバーシップ推論

Adversarial Contrastive Learning for LLM Quantization Attacks

Authors: Dinghong Song, Zhiwei Xu, Hai Wan, Xibin Zhao, Pengfei Su, Dong Li | Published: 2026-01-06
LLMの安全機構の解除
モデル抽出攻撃
量子化とプライバシー

LAsset: An LLM-assisted Security Asset Identification Framework for System-on-Chip (SoC) Verification

Authors: Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan, Nashmin Alam, Azim Uddin, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-01-06
LLM活用
セキュリティ分析手法
脅威モデリング自動化

Quantum AI for Cybersecurity: A hybrid Quantum-Classical models for attack path analysis

Authors: Jessica A. Sciammarelli, Waqas Ahmed | Published: 2026-01-05
セキュリティ分析手法
データ前処理
量子機械学習

UnPII: Unlearning Personally Identifiable Information with Quantifiable Exposure Risk

Authors: Intae Jeon, Yujeong Kwon, Hyungjoon Koo | Published: 2026-01-05
データ選択戦略
プライバシー保護技術
モデルインバージョン

Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation

Authors: Heba Osama, Omar Elebiary, Youssef Qassim, Mohamed Amgad, Ahmed Maghawry, Ahmed Saafan, Haitham Ghalwash | Published: 2025-12-29
SQLインジェクション攻撃検出
データ前処理
機械学習技術