$α^3$-SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks

Authors: Mohamed Amine Ferrag, Abderrahmane Lakas, Merouane Debbah | Published: 2026-01-26

Scaling up Privacy-Preserving ML: A CKKS Implementation of Llama-2-7B

Authors: Jaiyoung Park, Sejin Park, Jai Hyun Park, Jung Ho Ahn, Jung Hee Cheon, Guillaume Hanrot, Jung Woo Kim, Minje Park, Damien Stehlé | Published: 2026-01-26

Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents

Authors: Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy | Published: 2026-01-26

PAL*M: Property Attestation for Large Generative Models

Authors: Prach Chantasantitam, Adam Ilyas Caulfield, Vasisht Duddu, Lachlan J. Gunn, N. Asokan | Published: 2026-01-22

On damage of interpolation to adversarial robustness in regression

Authors: Jingfu Peng, Yuhong Yang | Published: 2026-01-22

CAFE-GB: Scalable and Stable Feature Selection for Malware Detection via Chunk-wise Aggregated Gradient Boosting

Authors: Ajvad Haneef K, Karan Kuwar Singh, Madhu Kumar S D | Published: 2026-01-22

Connect the Dots: Knowledge Graph-Guided Crawler Attack on Retrieval-Augmented Generation Systems

Authors: Mengyu Yao, Ziqi Zhang, Ning Luo, Shaofei Li, Yifeng Cai, Xiangqun Chen, Yao Guo, Ding Li | Published: 2026-01-22

Predictive Coding and Information Bottleneck for Hallucination Detection in Large Language Models

Authors: Manish Bhatt | Published: 2026-01-22

Data-Free Privacy-Preserving for LLMs via Model Inversion and Selective Unlearning

Authors: Xinjie Zhou, Zhihui Yang, Lechao Cheng, Sai Wu, Gang Chen | Published: 2026-01-22

Lightweight LLMs for Network Attack Detection in IoT Networks

Authors: Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage | Published: 2026-01-21