A Novel XAI-Enhanced Quantum Adversarial Networks for Velocity Dispersion Modeling in MaNGA Galaxies

Authors: Sathwik Narkedimilli, N V Saran Kumar, Aswath Babu H, Manjunath K Vanahalli, Manish M, Vinija Jain, Aman Chadha | Published: 2025-10-28

Design and Optimization of Cloud Native Homomorphic Encryption Workflows for Privacy-Preserving ML Inference

Authors: Tejaswini Bollikonda | Published: 2025-10-28

Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations

Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28

SPEAR++: Scaling Gradient Inversion via Sparsely-Used Dictionary Learning

Authors: Alexander Bakarsky, Dimitar I. Dimitrov, Maximilian Baader, Martin Vechev | Published: 2025-10-28

LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models

Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28

Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks

Authors: Yaokai Feng, Kouichi Sakurai | Published: 2025-10-27

Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing

Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27

Fast-MIA: Efficient and Scalable Membership Inference for LLMs

Authors: Hiromu Takahashi, Shotaro Ishihara | Published: 2025-10-27

Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies

Authors: Bin Wang, YiLu Zhong, MiDi Wan, WenJie Yu, YuanBing Ouyang, Yenan Huang, Hui Li | Published: 2025-10-27

RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines

Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23