LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies

Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15

ReasAlign: Reasoning Enhanced Safety Alignment against Prompt Injection Attack

Authors: Hao Li, Yankai Yang, G. Edward Suh, Ning Zhang, Chaowei Xiao | Published: 2026-01-15

Privacy Enhanced PEFT: Tensor Train Decomposition Improves Privacy Utility Tradeoffs under DP-SGD

Authors: Pradip Kunwar, Minh Vu, Maanak Gupta, Manish Bhattarai | Published: 2026-01-15

SoK: Privacy-aware LLM in Healthcare: Threat Model, Privacy Techniques, Challenges and Recommendations

Authors: Mohoshin Ara Tahera, Karamveer Singh Sidhu, Shuvalaxmi Dass, Sajal Saha | Published: 2026-01-15

The Promptware Kill Chain: How Prompt Injections Gradually Evolved Into a Multi-Step Malware

Authors: Ben Nassi, Bruce Schneier, Oleg Brodt | Published: 2026-01-14

SoK: Enhancing Cryptographic Collaborative Learning with Differential Privacy

Authors: Francesco Capano, Jonas Böhler, Benjamin Weggenmann | Published: 2026-01-14

SpatialJB: How Text Distribution Art Becomes the “Jailbreak Key” for LLM Guardrails

Authors: Zhiyi Mou, Jingyuan Yang, Zeheng Qian, Wangze Ni, Tianfang Xiao, Ning Liu, Chen Zhang, Zhan Qin, Kui Ren | Published: 2026-01-14

KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation

Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14

A Decompilation-Driven Framework for Malware Detection with Large Language Models

Authors: Aniesh Chawla, Udbhav Prasad | Published: 2026-01-14

DNF: Dual-Layer Nested Fingerprinting for Large Language Model Intellectual Property Protection

Authors: Zhenhua Xu, Yiran Zhao, Mengting Zhong, Dezhang Kong, Changting Lin, Tong Qiao, Meng Han | Published: 2026-01-13