LLM活用

LLMs Can Unlearn Refusal with Only 1,000 Benign Samples

Authors: Yangyang Guo, Ziwei Xu, Si Liu, Zhiming Zheng, Mohan Kankanhalli | Published: 2026-01-27
LLM活用
大規模言語モデル
安全性評価

AgenticSCR: An Autonomous Agentic Secure Code Review for Immature Vulnerabilities Detection

Authors: Wachiraphan Charoenwet, Kla Tantithamthavorn, Patanamon Thongtanunam, Hong Yi Lin, Minwoo Jeong, Ming Wu | Published: 2026-01-27
LLM活用
セキュリティ保証
脆弱性検出手法

Thought-Transfer: Indirect Targeted Poisoning Attacks on Chain-of-Thought Reasoning Models

Authors: Harsh Chaudhari, Ethan Rathbum, Hanna Foerster, Jamie Hayes, Matthew Jagielski, Milad Nasr, Ilia Shumailov, Alina Oprea | Published: 2026-01-27
LLM活用
データ汚染検出
出力の有害度の算出

$α^3$-SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks

Authors: Mohamed Amine Ferrag, Abderrahmane Lakas, Merouane Debbah | Published: 2026-01-26
LLM活用
セキュリティ保証
プロンプトインジェクション

Scaling up Privacy-Preserving ML: A CKKS Implementation of Llama-2-7B

Authors: Jaiyoung Park, Sejin Park, Jai Hyun Park, Jung Ho Ahn, Jung Hee Cheon, Guillaume Hanrot, Jung Woo Kim, Minje Park, Damien Stehlé | Published: 2026-01-26
LLM活用
プロンプトリーキング
線形代数最適化

Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents

Authors: Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy | Published: 2026-01-26
LLM活用
RAG
セキュリティ保証

Data-Free Privacy-Preserving for LLMs via Model Inversion and Selective Unlearning

Authors: Xinjie Zhou, Zhihui Yang, Lechao Cheng, Sai Wu, Gang Chen | Published: 2026-01-22
LLM活用
プライバシー保護
差分プライバシー

Lightweight LLMs for Network Attack Detection in IoT Networks

Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21
IoTセキュリティリスク
LLM活用
RAGへのポイズニング攻撃

ReasAlign: Reasoning Enhanced Safety Alignment against Prompt Injection Attack

Authors: Hao Li, Yankai Yang, G. Edward Suh, Ning Zhang, Chaowei Xiao | Published: 2026-01-15
LLM活用
インダイレクトプロンプトインジェクション
プロンプトインジェクション

SoK: Privacy-aware LLM in Healthcare: Threat Model, Privacy Techniques, Challenges and Recommendations

Authors: Mohoshin Ara Tahera, Karamveer Singh Sidhu, Shuvalaxmi Dass, Sajal Saha | Published: 2026-01-15
LLM活用
プライバシー保護
差分プライバシー