IoT Device Identification with Machine Learning: Common Pitfalls and Best Practices

Authors: Kahraman Kostas, Rabia Yasa Kostas | Published: 2026-01-28

Eliciting Least-to-Most Reasoning for Phishing URL Detection

Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28

GAVEL: Towards rule-based safety through activation monitoring

Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27

RvB: Automating AI System Hardening via Iterative Red-Blue Games

Authors: Lige Huang, Zicheng Liu, Jie Zhang, Lewen Yan, Dongrui Liu, Jing Shao | Published: 2026-01-27

CHEHAB RL: Learning to Optimize Fully Homomorphic Encryption Computations

Authors: Bilel Sefsaf, Abderraouf Dandani, Abdessamed Seddiki, Arab Mohammed, Eduardo Chielle, Michail Maniatakos, Riyadh Baghdadi | Published: 2026-01-27

AI-driven Intrusion Detection for UAV in Smart Urban Ecosystems: A Comprehensive Survey

Authors: Abdullah Khanfor, Raby Hamadi, Noureddine Lasla, Hakim Ghazzai | Published: 2026-01-27

LLMs Can Unlearn Refusal with Only 1,000 Benign Samples

Authors: Yangyang Guo, Ziwei Xu, Si Liu, Zhiming Zheng, Mohan Kankanhalli | Published: 2026-01-27

AgenticSCR: An Autonomous Agentic Secure Code Review for Immature Vulnerabilities Detection

Authors: Wachiraphan Charoenwet, Kla Tantithamthavorn, Patanamon Thongtanunam, Hong Yi Lin, Minwoo Jeong, Ming Wu | Published: 2026-01-27

Thought-Transfer: Indirect Targeted Poisoning Attacks on Chain-of-Thought Reasoning Models

Authors: Harsh Chaudhari, Ethan Rathbum, Hanna Foerster, Jamie Hayes, Matthew Jagielski, Milad Nasr, Ilia Shumailov, Alina Oprea | Published: 2026-01-27

$α^3$-SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks

Authors: Mohamed Amine Ferrag, Abderrahmane Lakas, Merouane Debbah | Published: 2026-01-26