Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations

Authors: Ron F. Del Rosario, Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-09-10

Send to which account? Evaluation of an LLM-based Scambaiting System

Authors: Hossein Siadati, Haadi Jafarian, Sima Jafarikhah | Published: 2025-09-10

Efficient Decoding Methods for Language Models on Encrypted Data

Authors: Matan Avitan, Moran Baruch, Nir Drucker, Itamar Zimerman, Yoav Goldberg | Published: 2025-09-10

Phish-Blitz: Advancing Phishing Detection with Comprehensive Webpage Resource Collection and Visual Integrity Preservation

Authors: Duddu Hriday, Aditya Kulkarni, Vivek Balachandran, Tamal Das | Published: 2025-09-10

An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection

Authors: Haywood Gelman, John D. Hastings, David Kenley | Published: 2025-09-08

Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers from LLMs via Claim Verification

Authors: Aivin V. Solatorio | Published: 2025-09-08

Not All Samples Are Equal: Quantifying Instance-level Difficulty in Targeted Data Poisoning

Authors: William Xu, Yiwei Lu, Yihan Wang, Matthew Y. R. Yang, Zuoqiu Liu, Gautam Kamath, Yaoliang Yu | Published: 2025-09-08

EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language Models

Authors: Mohammad Reza Mirbagheri, Mohammad Mahdi Mirkamali, Zahra Motoshaker Arani, Ali Javeri, Amir Mahdi Sadeghzadeh, Rasool Jalili | Published: 2025-09-08

Imitative Membership Inference Attack

Authors: Yuntao Du, Yuetian Chen, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-09-08

When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing

Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08