Unveiling the Resilience of LLM-Enhanced Search Engines against Black-Hat SEO Manipulation

Authors: Pei Chen, Geng Hong, Xinyi Wu, Mengying Wu, Zixuan Zhu, Mingxuan Liu, Baojun Liu, Mi Zhang, Min Yang | Published: 2026-03-26

Beyond Content Safety: Real-Time Monitoring for Reasoning Vulnerabilities in Large Language Models

Authors: Xunguang Wang, Yuguang Zhou, Qingyue Wang, Zongjie Li, Ruixuan Huang, Zhenlan Ji, Pingchuan Ma, Shuai Wang | Published: 2026-03-26

ALPS: Automated Least-Privilege Enforcement for Securing Serverless Functions

Authors: Changhee Shin, Bom Kim, Seungsoo Lee | Published: 2026-03-26

On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor Threats

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26

Physical Backdoor Attack Against Deep Learning-Based Modulation Classification

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26

Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26

PIDP-Attack: Combining Prompt Injection with Database Poisoning Attacks on Retrieval-Augmented Generation Systems

Authors: Haozhen Wang, Haoyue Liu, Jionghao Zhu, Zhichao Wang, Yongxin Guo, Xiaoying Tang | Published: 2026-03-26

Attack Assessment and Augmented Identity Recognition for Human Skeleton Data

Authors: Joseph G. Zalameda, Megan A. Witherow, Alexander M. Glandon, Jose Aguilera, Khan M. Iftekharuddin | Published: 2026-03-25

Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search

Authors: Yulin Shen, Xudong Pan, Geng Hong, Min Yang | Published: 2026-03-25

Walma: Learning to See Memory Corruption in WebAssembly

Authors: Oussama Draissi, Mark Günzel, Ahmad-Reza Sadeghi, Lucas Davi | Published: 2026-03-25