PAC-Private Responses with Adversarial Composition

Authors: Xiaochen Zhu, Mayuri Sridhar, Srinivas Devadas | Published: 2026-01-20

VirtualCrime: Evaluating Criminal Potential of Large Language Models via Sandbox Simulation

Authors: Yilin Tang, Yu Wang, Lanlan Qiu, Wenchang Gao, Yunfei Ma, Baicheng Chen, Tianxing He | Published: 2026-01-20

HardSecBench: Benchmarking the Security Awareness of LLMs for Hardware Code Generation

Authors: Qirui Chen, Jingxian Shuai, Shuangwu Chen, Shenghao Ye, Zijian Wen, Xufei Su, Jie Jin, Jiangming Li, Jun Chen, Xiaobin Tan, Jian Yang | Published: 2026-01-20

PINA: Prompt Injection Attack against Navigation Agents

Authors: Jiani Liu, Yixin He, Lanlan Fan, Qidi Zhong, Yushi Cheng, Meng Zhang, Yanjiao Chen, Wenyuan Xu | Published: 2026-01-20

Automatic Adjustment of HPA Parameters and Attack Prevention in Kubernetes Using Random Forests

Authors: Hanlin Zhou, Huah Yong Chan, Jingfei Ni, Mengchun Wu, Qing Deng | Published: 2026-01-20

Be Your Own Red Teamer: Safety Alignment via Self-Play and Reflective Experience Replay

Authors: Hao Wang, Yanting Wang, Hao Li, Rui Li, Lei Sha | Published: 2026-01-15

LADFA: A Framework of Using Large Language Models and Retrieval-Augmented Generation for Personal Data Flow Analysis in Privacy Policies

Authors: Haiyue Yuan, Nikolay Matyunin, Ali Raza, Shujun Li | Published: 2026-01-15

ReasAlign: Reasoning Enhanced Safety Alignment against Prompt Injection Attack

Authors: Hao Li, Yankai Yang, G. Edward Suh, Ning Zhang, Chaowei Xiao | Published: 2026-01-15

Privacy Enhanced PEFT: Tensor Train Decomposition Improves Privacy Utility Tradeoffs under DP-SGD

Authors: Pradip Kunwar, Minh Vu, Maanak Gupta, Manish Bhattarai | Published: 2026-01-15

SoK: Privacy-aware LLM in Healthcare: Threat Model, Privacy Techniques, Challenges and Recommendations

Authors: Mohoshin Ara Tahera, Karamveer Singh Sidhu, Shuvalaxmi Dass, Sajal Saha | Published: 2026-01-15