David vs. Goliath: Verifiable Agent-to-Agent Jailbreaking via Reinforcement Learning

Authors: Samuel Nellessen, Tal Kachman | Published: 2026-02-02

Guaranteeing Privacy in Hybrid Quantum Learning through Theoretical Mechanisms

Authors: Hoang M. Ngo, Tre' R. Jeter, Incheol Shin, Wanli Xing, Tamer Kahveci, My T. Thai | Published: 2026-02-02

Malware Detection Through Memory Analysis

Authors: Sarah Nassar | Published: 2026-02-02

Co-RedTeam: Orchestrated Security Discovery and Exploitation with LLM Agents

Authors: Pengfei He, Ash Fox, Lesly Miculicich, Stefan Friedli, Daniel Fabian, Burak Gokturk, Jiliang Tang, Chen-Yu Lee, Tomas Pfister, Long T. Le | Published: 2026-02-02

Human Society-Inspired Approaches to Agentic AI Security: The 4C Framework

Authors: Alsharif Abuadbba, Nazatul Sultan, Surya Nepal, Sanjay Jha | Published: 2026-02-02

RedVisor: Reasoning-Aware Prompt Injection Defense via Zero-Copy KV Cache Reuse

Authors: Mingrui Liu, Sixiao Zhang, Cheng Long, Kwok-Yan Lam | Published: 2026-02-02

WorldCup Sampling for Multi-bit LLM Watermarking

Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02

AI-Assisted Adaptive Rendering for High-Frequency Security Telemetry in Web Interfaces

Authors: Mona Rajhans | Published: 2026-02-02

Efficient Softmax Reformulation for Homomorphic Encryption via Moment Generating Function

Authors: Hanjun Park, Byeong-Seo Min, Jiheon Woo, Min-Wook Jeong, Jongho Shin, Yongwoo Lee, Young-Sik Kim, Yongjune Kim | Published: 2026-02-02

Hardware-Triggered Backdoors

Authors: Jonas Möller, Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck | Published: 2026-01-29