An Empirical Study on Remote Code Execution in Machine Learning Model Hosting Ecosystems Authors: Mohammed Latif Siddiq, Tanzim Hossain Romel, Natalie Sekerak, Beatrice Casey, Joanna C. S. Santos | Published: 2026-01-20 2026.01.20 2026.01.22 Literature Database
PAC-Private Responses with Adversarial Composition Authors: Xiaochen Zhu, Mayuri Sridhar, Srinivas Devadas | Published: 2026-01-20 2026.01.20 2026.01.22 Literature Database
VirtualCrime: Evaluating Criminal Potential of Large Language Models via Sandbox Simulation Authors: Yilin Tang, Yu Wang, Lanlan Qiu, Wenchang Gao, Yunfei Ma, Baicheng Chen, Tianxing He | Published: 2026-01-20 2026.01.20 2026.01.22 Literature Database
HardSecBench: Benchmarking the Security Awareness of LLMs for Hardware Code Generation Authors: Qirui Chen, Jingxian Shuai, Shuangwu Chen, Shenghao Ye, Zijian Wen, Xufei Su, Jie Jin, Jiangming Li, Jun Chen, Xiaobin Tan, Jian Yang | Published: 2026-01-20 2026.01.20 2026.01.22 Literature Database
PINA: Prompt Injection Attack against Navigation Agents Authors: Jiani Liu, Yixin He, Lanlan Fan, Qidi Zhong, Yushi Cheng, Meng Zhang, Yanjiao Chen, Wenyuan Xu | Published: 2026-01-20 2026.01.20 2026.01.22 Literature Database
Automatic Adjustment of HPA Parameters and Attack Prevention in Kubernetes Using Random Forests Authors: Hanlin Zhou, Huah Yong Chan, Jingfei Ni, Mengchun Wu, Qing Deng | Published: 2026-01-20 2026.01.20 2026.01.22 Literature Database
Be Your Own Red Teamer: Safety Alignment via Self-Play and Reflective Experience Replay Authors: Hao Wang, Yanting Wang, Hao Li, Rui Li, Lei Sha | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
ReasAlign: Reasoning Enhanced Safety Alignment against Prompt Injection Attack Authors: Hao Li, Yankai Yang, G. Edward Suh, Ning Zhang, Chaowei Xiao | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
Privacy Enhanced PEFT: Tensor Train Decomposition Improves Privacy Utility Tradeoffs under DP-SGD Authors: Pradip Kunwar, Minh Vu, Maanak Gupta, Manish Bhattarai | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database