Memory-Based Malware Detection under Limited Data Conditions: A Comparative Evaluation of TabPFN and Ensemble Models Authors: Valentin Leroy, Shuvalaxmi Dass, Sharif Ullah | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
When Bots Take the Bait: Exposing and Mitigating the Emerging Social Engineering Attack in Web Automation Agent Authors: Xinyi Wu, Geng Hong, Yueyue Chen, MingXuan Liu, Feier Jin, Xudong Pan, Jiarun Dai, Baojun Liu | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
Defenses Against Prompt Attacks Learn Surface Heuristics Authors: Shawn Li, Chenxiao Yu, Zhiyu Ni, Hao Li, Charith Peris, Chaowei Xiao, Yue Zhao | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
Safe-FedLLM: Delving into the Safety of Federated Large Language Models Authors: Mingxiang Tao, Yu Tian, Wenxuan Tu, Yue Yang, Xue Yang, Xiangyan Tang | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
Enhancing Cloud Network Resilience via a Robust LLM-Empowered Multi-Agent Reinforcement Learning Framework Authors: Yixiao Peng, Hao Hu, Feiyang Li, Xinye Cao, Yingchang Jiang, Jipeng Tang, Guoshun Nan, Yuling Liu | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database
Knowledge-to-Data: LLM-Driven Synthesis of Structured Network Traffic for Testbed-Free IDS Evaluation Authors: Konstantinos E. Kampourakis, Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Stefanos Gritzalis | Published: 2026-01-08 2026.01.08 2026.01.10 Literature Database
CurricuLLM: Designing Personalized and Workforce-Aligned Cybersecurity Curricula Using Fine-Tuned LLMs Authors: Arthur Nijdam, Harri Kähkönen, Valtteri Niemi, Paul Stankovski Wagner, Sara Ramezanian | Published: 2026-01-08 2026.01.08 2026.01.10 Literature Database
Decentralized Privacy-Preserving Federal Learning of Computer Vision Models on Edge Devices Authors: Damian Harenčák, Lukáš Gajdošech, Martin Madaras | Published: 2026-01-08 2026.01.08 2026.01.10 Literature Database
Unified Framework for Qualifying Security Boundary of PUFs Against Machine Learning Attacks Authors: Hongming Fei, Zilong Hu, Prosanta Gope, Biplab Sikdar | Published: 2026-01-08 2026.01.08 2026.01.10 Literature Database
Know Thy Enemy: Securing LLMs Against Prompt Injection via Diverse Data Synthesis and Instruction-Level Chain-of-Thought Learning Authors: Zhiyuan Chang, Mingyang Li, Yuekai Huang, Ziyou Jiang, Xiaojun Jia, Qian Xiong, Junjie Wang, Zhaoyang Li, Qing Wang | Published: 2026-01-08 2026.01.08 2026.01.10 Literature Database