Hardware-Triggered Backdoors

Authors: Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck | Published: 2026-01-29

LoRA and Privacy: When Random Projections Help (and When They Don’t)

Authors: Yaxi Hu, Johanna Düngler, Bernhard Schölkopf, Amartya Sanyal | Published: 2026-01-29

FIT: Defying Catastrophic Forgetting in Continual LLM Unlearning

Authors: Xiaoyu Xu, Minxin Du, Kun Fang, Zi Liang, Yaxin Xiao, Zhicong Huang, Cheng Hong, Qingqing Ye, Haibo Hu | Published: 2026-01-29

ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses

Authors: Ningyuan He, Ronghong Huang, Qianqian Tang, Hongyu Wang, Xianghang Mi, Shanqing Guo | Published: 2026-01-29

Towards Zero Rotation and Beyond: Architecting Neural Networks for Fast Secure Inference with Homomorphic Encryption

Authors: Yifei Cai, Yizhou Feng, Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2026-01-29

User-Centric Phishing Detection: A RAG and LLM-Based Approach

Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29

Adaptive and Robust Cost-Aware Proof of Quality for Decentralized LLM Inference Networks

Authors: Arther Tian, Alex Ding, Frank Chen, Simon Wu, Aaron Chan | Published: 2026-01-29

IoT Device Identification with Machine Learning: Common Pitfalls and Best Practices

Authors: Kahraman Kostas, Rabia Yasa Kostas | Published: 2026-01-28

Eliciting Least-to-Most Reasoning for Phishing URL Detection

Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28

GAVEL: Towards rule-based safety through activation monitoring

Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27