LLMs Can Unlearn Refusal with Only 1,000 Benign Samples Authors: Yangyang Guo, Ziwei Xu, Si Liu, Zhiming Zheng, Mohan Kankanhalli | Published: 2026-01-27 LLM活用大規模言語モデル安全性評価 2026.01.27 文献データベース
AgenticSCR: An Autonomous Agentic Secure Code Review for Immature Vulnerabilities Detection Authors: Wachiraphan Charoenwet, Kla Tantithamthavorn, Patanamon Thongtanunam, Hong Yi Lin, Minwoo Jeong, Ming Wu | Published: 2026-01-27 LLM活用セキュリティ保証脆弱性検出手法 2026.01.27 文献データベース
Thought-Transfer: Indirect Targeted Poisoning Attacks on Chain-of-Thought Reasoning Models Authors: Harsh Chaudhari, Ethan Rathbum, Hanna Foerster, Jamie Hayes, Matthew Jagielski, Milad Nasr, Ilia Shumailov, Alina Oprea | Published: 2026-01-27 LLM活用データ汚染検出出力の有害度の算出 2026.01.27 文献データベース
$α^3$-SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks Authors: Mohamed Amine Ferrag, Abderrahmane Lakas, Merouane Debbah | Published: 2026-01-26 LLM活用セキュリティ保証プロンプトインジェクション 2026.01.26 文献データベース
Scaling up Privacy-Preserving ML: A CKKS Implementation of Llama-2-7B Authors: Jaiyoung Park, Sejin Park, Jai Hyun Park, Jung Ho Ahn, Jung Hee Cheon, Guillaume Hanrot, Jung Woo Kim, Minje Park, Damien Stehlé | Published: 2026-01-26 LLM活用プロンプトリーキング線形代数最適化 2026.01.26 文献データベース
Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents Authors: Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy | Published: 2026-01-26 LLM活用RAGセキュリティ保証 2026.01.26 文献データベース
Data-Free Privacy-Preserving for LLMs via Model Inversion and Selective Unlearning Authors: Xinjie Zhou, Zhihui Yang, Lechao Cheng, Sai Wu, Gang Chen | Published: 2026-01-22 LLM活用プライバシー保護差分プライバシー 2026.01.22 文献データベース
Lightweight LLMs for Network Attack Detection in IoT Networks Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21 IoTセキュリティリスクLLM活用RAGへのポイズニング攻撃 2026.01.21 文献データベース
ReasAlign: Reasoning Enhanced Safety Alignment against Prompt Injection Attack Authors: Hao Li, Yankai Yang, G. Edward Suh, Ning Zhang, Chaowei Xiao | Published: 2026-01-15 LLM活用インダイレクトプロンプトインジェクションプロンプトインジェクション 2026.01.15 文献データベース
SoK: Privacy-aware LLM in Healthcare: Threat Model, Privacy Techniques, Challenges and Recommendations Authors: Mohoshin Ara Tahera, Karamveer Singh Sidhu, Shuvalaxmi Dass, Sajal Saha | Published: 2026-01-15 LLM活用プライバシー保護差分プライバシー 2026.01.15 文献データベース