Data Leakage in Automotive Perception: Practitioners’ Insights Authors: Md Abu Ahammed Babu, Sushant Kumar Pandey, Darko Durisic, Andras Balint, Miroslaw Staron | Published: 2026-04-08 2026.04.08 2026.04.09 Literature Database
MirageBackdoor: A Stealthy Attack that Induces Think-Well-Answer-Wrong Reasoning Authors: Yizhe Zeng, Wei Zhang, Yunpeng Li, Juxin Xiao, Xiao Wang, Yuling Liu | Published: 2026-04-08 2026.04.08 2026.04.09 Literature Database
Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection Authors: Zi Liang, Qipeng Xie, Jun He, Bohuan Xue, Weizheng Wang, Yuandao Cai, Fei Luo, Boxian Zhang, Haibo Hu, Kaishun Wu | Published: 2026-04-08 2026.04.08 2026.04.09 Literature Database
PoC-Adapt: Semantic-Aware Automated Vulnerability Reproduction with LLM Multi-Agents and Reinforcement Learning-Driven Adaptive Policy Authors: Phan The Duy, Nguyen Viet Duy, Khoa Ngo-Khanh, Nguyen Huu Quyen, Van-Hau Pham | Published: 2026-04-08 2026.04.08 2026.04.09 Literature Database
Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box Threats Authors: Adrian Shuai Li, Md Ajwad Akil, Elisa Bertino | Published: 2026-04-08 2026.04.08 2026.04.09 Literature Database
WebSP-Eval: Evaluating Web Agents on Website Security and Privacy Tasks Authors: Guruprasad Viswanathan Ramesh, Asmit Nayak, Basieem Siddique, Kassem Fawaz | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
Blockchain and AI: Securing Intelligent Networks for the Future Authors: Joy Dutta, Hossien B. Eldeeb, Tu Dac Ho | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
FedSpy-LLM: Towards Scalable and Generalizable Data Reconstruction Attacks from Gradients on LLMs Authors: Syed Irfan Ali Meerza, Feiyi Wang, Jian Liu | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
LLM4CodeRE: Generative AI for Code Decompilation Analysis and Reverse Engineering Authors: Hamed Jelodar, Samita Bai, Tochukwu Emmanuel Nwankwo, Parisa Hamedi, Mohammad Meymani, Roozbeh Razavi-Far, Ali A. Ghorbani | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
CritBench: A Framework for Evaluating Cybersecurity Capabilities of Large Language Models in IEC 61850 Digital Substation Environments Authors: Gustav Keppler, Moritz Gstür, Veit Hagenmeyer | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database