文献データベース

Blockchain and AI: Securing Intelligent Networks for the Future

Authors: Joy Dutta, Hossien B. Eldeeb, Tu Dac Ho | Published: 2026-04-07
AIによる出力のバイアスの検出
アライメント
ブロックチェーン

FedSpy-LLM: Towards Scalable and Generalizable Data Reconstruction Attacks from Gradients on LLMs

Authors: Syed Irfan Ali Meerza, Feiyi Wang, Jian Liu | Published: 2026-04-07
LLM性能評価
プロンプトリーキング
攻撃手法の効果

LLM4CodeRE: Generative AI for Code Decompilation Analysis and Reverse Engineering

Authors: Hamed Jelodar, Samita Bai, Tochukwu Emmanuel Nwankwo, Parisa Hamedi, Mohammad Meymani, Roozbeh Razavi-Far, Ali A. Ghorbani | Published: 2026-04-07
LLM性能評価
プロンプトリーキング
リバースエンジニアリング

CritBench: A Framework for Evaluating Cybersecurity Capabilities of Large Language Models in IEC 61850 Digital Substation Environments

Authors: Gustav Keppler, Moritz Gstür, Veit Hagenmeyer | Published: 2026-04-07
LLM性能評価
データ収集手法
モデル評価

A Formal Security Framework for MCP-Based AI Agents: Threat Taxonomy, Verification Models, and Defense Mechanisms

Authors: Nirajan Acharya, Gaurav Kumar Gupta | Published: 2026-04-07
セキュリティフレームワーク
攻撃手法の説明
防御手法

Swiss-Bench 003: Evaluating LLM Reliability and Adversarial Security for Swiss Regulatory Contexts

Authors: Fatih Uenal | Published: 2026-04-07
LLM性能評価
フレームワーク
モデル性能評価

ClawLess: A Security Model of AI Agents

Authors: Hongyi Lu, Nian Liu, Shuai Wang, Fengwei Zhang | Published: 2026-04-07
セキュアアグリゲーション
フレームワーク
動的ポリシー適応

Hackers or Hallucinators? A Comprehensive Analysis of LLM-Based Automated Penetration Testing

Authors: Jiaren Peng, Zeqin Li, Chang You, Yan Wang, Hanlin Sun, Xuan Tian, Shuqiao Zhang, Junyi Liu, Jianguo Zhao, Renyang Liu, Haoran Ou, Yuqiang Sun, Jiancheng Zhang, Yutong Jiao, Kunshu Song, Chao Zhang, Fan Shi, Hongda Sun, Rui Yan, Cheng Huang | Published: 2026-04-07
RAG
RAGへのポイズニング攻撃
フレームワーク

Foundations for Agentic AI Investigations from the Forensic Analysis of OpenClaw

Authors: Jan Gruber, Jan-Niclas Hilgert | Published: 2026-04-07
AIシステムの関係性
データ収集
行動分析手法

Towards the Development of an LLM-Based Methodology for Automated Security Profiling in Compliance with Ukrainian Cybersecurity Regulations

Authors: Daniil Shafranskyi, Iryna Stopochkina, Mykola Ilin | Published: 2026-04-07
LLM性能評価
RAG
セキュリティプロファイリング