SpatialJB: How Text Distribution Art Becomes the “Jailbreak Key” for LLM Guardrails Authors: Zhiyi Mou, Jingyuan Yang, Zeheng Qian, Wangze Ni, Tianfang Xiao, Ning Liu, Chen Zhang, Zhan Qin, Kui Ren | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
A Decompilation-Driven Framework for Malware Detection with Large Language Models Authors: Aniesh Chawla, Udbhav Prasad | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
DNF: Dual-Layer Nested Fingerprinting for Large Language Model Intellectual Property Protection Authors: Zhenhua Xu, Yiran Zhao, Mengting Zhong, Dezhang Kong, Changting Lin, Tong Qiao, Meng Han | Published: 2026-01-13 2026.01.13 2026.01.15 Literature Database
Evaluating Implicit Regulatory Compliance in LLM Tool Invocation via Logic-Guided Synthesis Authors: Da Song, Yuheng Huang, Boqi Chen, Tianshuo Cong, Randy Goebel, Lei Ma, Foutse Khomh | Published: 2026-01-13 2026.01.13 2026.01.15 Literature Database
SecureCAI: Injection-Resilient LLM Assistants for Cybersecurity Operations Authors: Mohammed Himayath Ali, Mohammed Aqib Abdullah, Mohammed Mudassir Uddin, Shahnawaz Alam | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
Towards Automating Blockchain Consensus Verification with IsabeLLM Authors: Elliot Jones, William Knottenbelt | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
A Protocol-Aware P4 Pipeline for MQTT Security and Anomaly Mitigation in Edge IoT Systems Authors: Bui Ngoc Thanh Binh, Pham Hoai Luan, Le Vu Trung Duong, Vu Tuan Hai, Yasuhiko Nakashima | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
Memory-Based Malware Detection under Limited Data Conditions: A Comparative Evaluation of TabPFN and Ensemble Models Authors: Valentin Leroy, Shuvalaxmi Dass, Sharif Ullah | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
When Bots Take the Bait: Exposing and Mitigating the Emerging Social Engineering Attack in Web Automation Agent Authors: Xinyi Wu, Geng Hong, Yueyue Chen, MingXuan Liu, Feier Jin, Xudong Pan, Jiarun Dai, Baojun Liu | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database