APFuzz: Towards Automatic Greybox Protocol Fuzzing

Authors: Yu Wang, Yang Xiang, Chandra Thapa, Hajime Suzuki | Published: 2026-02-25

Private and Robust Contribution Evaluation in Federated Learning

Authors: Delio Jaramillo Velez, Gergely Biczok, Alexandre Graell i Amat, Johan Ostman, Balazs Pejo | Published: 2026-02-25

Breaking Semantic-Aware Watermarks via LLM-Guided Coherence-Preserving Semantic Injection

Authors: Zheng Gao, Xiaoyu Li, Zhicheng Bao, Xiaoyan Feng, Jiaojiao Jiang | Published: 2026-02-25

The LLMbda Calculus: AI Agents, Conversations, and Information Flow

Authors: Zac Garby, Andrew D. Gordon, David Sands | Published: 2026-02-23

Can You Tell It’s AI? Human Perception of Synthetic Voices in Vishing Scenarios

Authors: Zoha Hayat Bhatti, Bakhtawar Ahtisham, Seemal Tausif, Niklas George, Nida ul Habib Bajwa, Mobin Javed | Published: 2026-02-23

RobPI: Robust Private Inference against Malicious Client

Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23

Dirichlet Scale Mixture Priors for Bayesian Neural Networks

Authors: August Arnstad, Leiv Rønneberg, Geir Storvik | Published: 2026-02-23

LLM-enabled Applications Require System-Level Threat Monitoring

Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23

An Explainable Memory Forensics Approach for Malware Analysis

Authors: Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto | Published: 2026-02-23

SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models

Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23