Machine Learning with Privacy for Protected Attributes

Authors: Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri | Published: 2025-06-24

KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs

Authors: Xin Fan Guo, Albert Merono Penuela, Sergio Maffeis, Fabio Pierazzi | Published: 2025-06-24

A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures

Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han | Published: 2025-06-24

Decompiling Smart Contracts with a Large Language Model

Authors: Isaac David, Liyi Zhou, Dawn Song, Arthur Gervais, Kaihua Qin | Published: 2025-06-24

PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty

Authors: Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, Yue Zhao | Published: 2025-06-24

PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes

Authors: Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni | Published: 2025-06-24

FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk

Authors: Sajal Halder, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-06-24

Amplifying Machine Learning Attacks Through Strategic Compositions

Authors: Yugeng Liu, Zheng Li, Hai Huang, Michael Backes, Yang Zhang | Published: 2025-06-23

Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks

Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23

DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?

Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23