RuleForge: Automated Generation and Validation for Web Vulnerability Detection at Scale Authors: Ayush Garg, Sophia Hager, Jacob Montiel, Aditya Tiwari, Michael Gentile, Zach Reavis, David Magnotti, Wayne Fullen | Published: 2026-04-02 2026.04.02 2026.04.04 Literature Database
Combating Data Laundering in LLM Training Authors: Muxing Li, Zesheng Ye, Sharon Li, Feng Liu | Published: 2026-04-02 2026.04.02 2026.04.04 Literature Database
Assertain: Automated Security Assertion Generation Using Large Language Models Authors: Shams Tarek, Dipayan Saha, Khan Thamid Hasan, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-04-02 2026.04.02 2026.04.04 Literature Database
AI-Assisted Hardware Security Verification: A Survey and AI Accelerator Case Study Authors: Khan Thamid Hasan, Md Ajoad Hasan, Nashmin Alam, Md. Touhidul Islam, Upoma Das, Farimah Farahmandi | Published: 2026-04-02 2026.04.02 2026.04.04 Literature Database
AgentWatcher: A Rule-based Prompt Injection Monitor Authors: Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia | Published: 2026-04-01 2026.04.01 2026.04.03 Literature Database
SERSEM: Selective Entropy-Weighted Scoring for Membership Inference in Code Language Models Authors: Kıvanç Kuzey Dikici, Serdar Kara, Semih Çağlar, Eray Tüzün, Sinem Sav | Published: 2026-04-01 2026.04.01 2026.04.03 Literature Database
Multi-Agent LLM Governance for Safe Two-Timescale Reinforcement Learning in SDN-IoT Defense Authors: Saeid Jamshidi, Negar Shahabi, Foutse Khomh, Carol Fung, Mohammad Hamdaqa | Published: 2026-04-01 2026.04.01 2026.04.03 Literature Database
Automated Framework to Evaluate and Harden LLM System Instructions against Encoding Attacks Authors: Anubhab Sahu, Diptisha Samanta, Reza Soosahabi | Published: 2026-04-01 2026.04.01 2026.04.03 Literature Database
AutoMIA: Improved Baselines for Membership Inference Attack via Agentic Self-Exploration Authors: Ruhao Liu, Weiqi Huang, Qi Li, Xinchao Wang | Published: 2026-04-01 2026.04.01 2026.04.03 Literature Database
LibScan: Smart Contract Library Misuse Detection with Iterative Feedback and Static Verification Authors: Yishun Wang, Wenkai Li, Xiaoqi Li, Zongwei Li, Lei Xie, Yuqing Zhang | Published: 2026-04-01 2026.04.01 2026.04.03 Literature Database