Sequential Membership Inference Attacks

Authors: Thomas Michel, Debabrota Basu, Emilie Kaufmann | Published: 2026-02-18

Recursive language models for jailbreak detection: a procedural defense for tool-augmented agents

Authors: Doron Shavit | Published: 2026-02-18

Phase-Based Bit Commitment Protocol

Authors: Janis Nötzel, Anshul Singhal, Peter van Loock | Published: 2026-02-18

Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification

Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18

A Content-Based Framework for Cybersecurity Refusal Decisions in Large Language Models

Authors: Meirav Segal, Noa Linder, Omer Antverg, Gil Gekker, Tomer Fichman, Omri Bodenheimer, Edan Maor, Omer Nevo | Published: 2026-02-17

SecCodeBench-V2 Technical Report

Authors: Longfei Chen, Ji Zhao, Lanxiao Cui, Tong Su, Xingbo Pan, Ziyang Li, Yongxing Wu, Qijiang Cao, Qiyao Cai, Jing Zhang, Yuandong Ni, Junyao He, Zeyu Zhang, Chao Ge, Xuhuai Lu, Zeyu Gao, Yuxin Cui, Weisen Chen, Yuxuan Peng, Shengping Wang, Qi Li, Yukai Huang, Yukun Liu, Tuo Zhou, Terry Yue Zhuo, Junyang Lin, Chao Zhang | Published: 2026-02-17

A Unified Evaluation of Learning-Based Similarity Techniques for Malware Detection

Authors: Udbhav Prasad, Aniesh Chawla | Published: 2026-02-17

Exposing the Systematic Vulnerability of Open-Weight Models to Prefill Attacks

Authors: Lukas Struppek, Adam Gleave, Kellin Pelrine | Published: 2026-02-16

LRD-MPC: Efficient MPC Inference through Low-rank Decomposition

Authors: Tingting Tang, Yongqin Wang, Murali Annavaram | Published: 2026-02-16

Differentially Private Retrieval-Augmented Generation

Authors: Tingting Tang, James Flemings, Yongqin Wang, Murali Annavaram | Published: 2026-02-16