Be Your Own Red Teamer: Safety Alignment via Self-Play and Reflective Experience Replay Authors: Hao Wang, Yanting Wang, Hao Li, Rui Li, Lei Sha | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
ReasAlign: Reasoning Enhanced Safety Alignment against Prompt Injection Attack Authors: Hao Li, Yankai Yang, G. Edward Suh, Ning Zhang, Chaowei Xiao | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
Privacy Enhanced PEFT: Tensor Train Decomposition Improves Privacy Utility Tradeoffs under DP-SGD Authors: Pradip Kunwar, Minh Vu, Maanak Gupta, Manish Bhattarai | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
SoK: Privacy-aware LLM in Healthcare: Threat Model, Privacy Techniques, Challenges and Recommendations Authors: Mohoshin Ara Tahera, Karamveer Singh Sidhu, Shuvalaxmi Dass, Sajal Saha | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
The Promptware Kill Chain: How Prompt Injections Gradually Evolved Into a Multi-Step Malware Authors: Ben Nassi, Bruce Schneier, Oleg Brodt | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
SoK: Enhancing Cryptographic Collaborative Learning with Differential Privacy Authors: Francesco Capano, Jonas Böhler, Benjamin Weggenmann | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
SpatialJB: How Text Distribution Art Becomes the “Jailbreak Key” for LLM Guardrails Authors: Zhiyi Mou, Jingyuan Yang, Zeheng Qian, Wangze Ni, Tianfang Xiao, Ning Liu, Chen Zhang, Zhan Qin, Kui Ren | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
A Decompilation-Driven Framework for Malware Detection with Large Language Models Authors: Aniesh Chawla, Udbhav Prasad | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database