Showing 121–140 of 468 results
/ Date/ Name
Apr 20, 2026Capturing Monetarily Exploitable Vulnerability in Smart Contracts via Auditor Knowledge-Learning FuzzingApr 20, 2026Tight Auditing of Differential Privacy in MST and AIMApr 20, 2026Compositional security definitions for higher-order where declassificationApr 20, 2026Subcodes of Lambda-Gabidulin Codes for Compact-Ciphertext CryptographyApr 20, 2026Beyond Pattern Matching: Seven Cross-Domain Techniques for Prompt Injection DetectionApr 20, 2026AgenTEE: Confidential LLM Agent Execution on Edge DevicesApr 20, 2026Committed SAE-Feature Traces for Audited-Session Substitution Detection in Hosted LLMsApr 20, 2026Beyond Explicit Refusals: Soft-Failure Attacks on Retrieval-Augmented GenerationApr 20, 2026Audit-or-Cast: Enforcing Honest Elections with Privacy-Preserving Public VerificationApr 20, 2026Evaluating Answer Leakage Robustness of LLM Tutors against Adversarial Student AttacksApr 20, 2026Dynamic Risk Assessment by Bayesian Attack Graphs and Process MiningApr 20, 2026Enhancing Anomaly-Based Intrusion Detection Systems with Process MiningApr 20, 2026ExAI5G: A Logic-Based Explainable AI Framework for Intrusion Detection in 5G NetworksApr 20, 2026Owner-Harm: A Missing Threat Model for AI Agent SafetyApr 20, 2026RAVEN: Retrieval-Augmented Vulnerability Exploration Network for Memory Corruption Analysis in User Code and Binary ProgramsApr 20, 2026TitanCA: Lessons from Orchestrating LLM Agents to Discover 100+ CVEsApr 20, 2026From Craft to Kernel: A Governance-First Execution Architecture and Semantic ISA for Agentic ComputersApr 20, 2026Privacy-Preserving Product-Quantized Approximate Nearest Neighbor Search Framework for Large-scale Datasets via A Hybrid of Fully Homomorphic Encryption and Trusted Execution EnvironmentApr 20, 2026Understanding Secret Leakage Risks in Code LLMs: A Tokenization PerspectiveApr 20, 2026Enabling AI ASICs for Zero Knowledge Proof