文献データベース

Deanonymizing Bitcoin Transactions via Network Traffic Analysis with Semi-supervised Learning

Authors: Shihan Zhang, Bing Han, Chuanyong Tian, Ruisheng Shi, Lina Lan, Qin Wang | Published: 2026-03-18
プライバシー漏洩
機械学習の応用
評価手法

SAMSEM — A Generic and Scalable Approach for IC Metal Line Segmentation

Authors: Christian Gehrmann, Jonas Ricker, Simon Damm, Deruo Cheng, Julian Speith, Yiqiong Shi, Asja Fischer, Christof Paar | Published: 2026-03-17
セグメンテーション手法
損失関数
設計検証

Rotated Robustness: A Training-Free Defense against Bit-Flip Attacks on Large Language Models

Authors: Deng Liu, Song Chen | Published: 2026-03-17
敵対的学習
脆弱性管理
評価手法

Resource Consumption Threats in Large Language Models

Authors: Yuanhe Zhang, Xinyue Wang, Zhican Chen, Weiliu Wang, Zilu Zhang, Zhengshuo Gong, Zhenhong Zhou, Li Sun, Yang Liu, Sen Su | Published: 2026-03-17
モデルDoS
リソース消費分析
脅威モデリング

From Storage to Steering: Memory Control Flow Attacks on LLM Agents

Authors: Zhenlin Xu, Xiaogang Zhu, Yu Yao, Minhui Xue, Yiliao Song | Published: 2026-03-16

$p^2$RAG: Privacy-Preserving RAG Service Supporting Arbitrary Top-$k$ Retrieval

Authors: Yulong Ming, Mingyue Wang, Jijia Yang, Cong Wang, Xiaohua Jia | Published: 2026-03-16

Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems

Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12
プロンプトインジェクション
モデル抽出攻撃
脆弱性管理

Understanding LLM Behavior When Encountering User-Supplied Harmful Content in Harmless Tasks

Authors: Junjie Chu, Yiting Qu, Ye Leng, Michael Backes, Yun Shen, Savvas Zannettou, Yang Zhang | Published: 2026-03-12
プロンプトインジェクション
プロンプトリーキング
リスク評価

Exponential-Family Membership Inference: From LiRA and RMIA to BaVarIA

Authors: Rickard Brännvall | Published: 2026-03-12
攻撃計画手法
機械学習アルゴリズム
評価手法

Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats

Authors: Xinhao Deng, Yixiang Zhang, Jiaqing Wu, Jiaqi Bai, Sibo Yi, Zhuoheng Zou, Yue Xiao, Rennai Qiu, Jianan Ma, Jialuo Chen, Xiaohu Du, Xiaofang Yang, Shiwen Cui, Changhua Meng, Weiqiang Wang, Jiaxing Song, Ke Xu, Qi Li | Published: 2026-03-12
インダイレクトプロンプトインジェクション
プロンプトインジェクション
脆弱性管理