Large Language Models for Cyber Security

Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06

Adversarially Robust and Interpretable Magecart Malware Detection

Authors: Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça | Published: 2025-11-06

Differentially Private In-Context Learning with Nearest Neighbor Search

Authors: Antti Koskela, Tejas Kulkarni, Laith Zumot | Published: 2025-11-06

Black-Box Guardrail Reverse-engineering Attack

Authors: Hongwei Yao, Yun Xia, Shuo Shao, Haoran Shi, Tong Qiao, Cong Wang | Published: 2025-11-06

Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems

Authors: Paul Badu Yakubu, Lesther Santana, Mohamed Rahouti, Yufeng Xin, Abdellah Chehri, Mohammed Aledhari | Published: 2025-11-06

Specification-Guided Vulnerability Detection with Large Language Models

Authors: Hao Zhu, Jia Li, Cuiyun Gao, Jiaru Qian, Yihong Dong, Huanyu Liu, Lecheng Wang, Ziliang Wang, Xiaolong Hu, Ge Li | Published: 2025-11-06

Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback

Authors: Shiyin Lin | Published: 2025-11-06

Whisper Leak: a side-channel attack on Large Language Models

Authors: Geoff McDonald, Jonathan Bar Or | Published: 2025-11-05

Watermarking Large Language Models in Europe: Interpreting the AI Act in Light of Technology

Authors: Thomas Souverain | Published: 2025-11-05

Let the Bees Find the Weak Spots: A Path Planning Perspective on Multi-Turn Jailbreak Attacks against LLMs

Authors: Yize Liu, Yunyun Hou, Aina Sui | Published: 2025-11-05