Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17

Whistledown: Combining User-Level Privacy with Conversational Coherence in LLMs

Authors: Chelsea McMurray, Hayder Tirmazi | Published: 2025-11-17

DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents

Authors: Fuyao Zhang, Jiaming Zhang, Che Wang, Xiongtao Sun, Yurong Hao, Guowei Guan, Wenjie Li, Longtao Huang, Wei Yang Bryan Lim | Published: 2025-11-17

SmartPoC: Generating Executable and Validated PoCs for Smart Contract Bug Reports

Authors: Longfei Chen, Ruibin Yan, Taiyu Wong, Yiyang Chen, Chao Zhang | Published: 2025-11-17

SafeGRPO: Self-Rewarded Multimodal Safety Alignment via Rule-Governed Policy Optimization

Authors: Xuankun Rong, Wenke Huang, Tingfeng Wang, Daiguo Zhou, Bo Du, Mang Ye | Published: 2025-11-17

SGuard-v1: Safety Guardrail for Large Language Models

Authors: JoonHo Lee, HyeonMin Cho, Jaewoong Yun, Hyunjae Lee, JunKyu Lee, Juree Seok | Published: 2025-11-16

SeedAIchemy: LLM-Driven Seed Corpus Generation for Fuzzing

Authors: Aidan Wen, Norah A. Alzahrani, Jingzhi Jiang, Andrew Joe, Karen Shieh, Andy Zhang, Basel Alomair, David Wagner | Published: 2025-11-16

GRAPHTEXTACK: A Realistic Black-Box Node Injection Attack on LLM-Enhanced GNNs

Authors: Jiaji Ma, Puja Trivedi, Danai Koutra | Published: 2025-11-16

The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models

Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16

Large Language Models for Cyber Security

Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06