CoDe-R: Refining Decompiler Output with LLMs via Rationale Guidance and Adaptive Inference

Authors: Qiang Zhang, Zhongnian Li | Published: 2026-04-14

Understanding and Improving Continuous Adversarial Training for LLMs via In-context Learning Theory

Authors: Shaopeng Fu, Di Wang | Published: 2026-04-14

Robust Semi-Supervised Temporal Intrusion Detection for Adversarial Cloud Networks

Authors: Anasuya Chattopadhyay, Daniel Reti, Hans D. Schotten | Published: 2026-04-14

DeepSeek Robustness Against Semantic-Character Dual-Space Mutated Prompt Injection

Authors: Junyu Ren, Xingjian Pan, Wensheng Gan, Philip S. Yu | Published: 2026-04-14

Compiling Activation Steering into Weights via Null-Space Constraints for Stealthy Backdoors

Authors: Rui Yin, Tianxu Han, Naen Xu, Changjiang Li, Ping He, Chunyi Zhou, Jun Wang, Zhihui Fu, Tianyu Du, Jinbao Li, Shouling Ji | Published: 2026-04-14

UniDetect: LLM-Driven Universal Fraud Detection across Heterogeneous Blockchains

Authors: Shuyi Miao, Wangjie Qiu, Shengda Zhuo, Fei Shen, Dan Lin, Xingtong Yu, Chua Tat-Seng, Zhiming Zheng | Published: 2026-04-14

TEMPLATEFUZZ: Fine-Grained Chat Template Fuzzing for Jailbreaking and Red Teaming LLMs

Authors: Qingchao Shen, Zibo Xiao, Lili Huang, Enwei Hu, Yongqiang Tian, Junjie Chen | Published: 2026-04-14

From IOCs to Regex: Automating CTI Operationalization for SOC with LLMs

Authors: Pei-Yu Tseng, Lan Zhang, ZihDwo Yeh, Xiaoyan Sun, Xushu Dai, Peng Liu | Published: 2026-04-14

TimeMark: A Trustworthy Time Watermarking Framework for Exact Generation-Time Recovery from AIGC

Authors: Shangkun Che, Silin Du, Ge Gao | Published: 2026-04-14

Fully Homomorphic Encryption on Llama 3 model for privacy preserving LLM inference

Authors: Anes Abdennebi, Nadjia Kara, Laaziz Lahlou | Published: 2026-04-14