Privacy Enhanced PEFT: Tensor Train Decomposition Improves Privacy Utility Tradeoffs under DP-SGD Authors: Pradip Kunwar, Minh Vu, Maanak Gupta, Manish Bhattarai | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
SoK: Privacy-aware LLM in Healthcare: Threat Model, Privacy Techniques, Challenges and Recommendations Authors: Mohoshin Ara Tahera, Karamveer Singh Sidhu, Shuvalaxmi Dass, Sajal Saha | Published: 2026-01-15 2026.01.15 2026.01.17 Literature Database
The Promptware Kill Chain: How Prompt Injections Gradually Evolved Into a Multi-Step Malware Authors: Ben Nassi, Bruce Schneier, Oleg Brodt | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
SoK: Enhancing Cryptographic Collaborative Learning with Differential Privacy Authors: Francesco Capano, Jonas Böhler, Benjamin Weggenmann | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
SpatialJB: How Text Distribution Art Becomes the “Jailbreak Key” for LLM Guardrails Authors: Zhiyi Mou, Jingyuan Yang, Zeheng Qian, Wangze Ni, Tianfang Xiao, Ning Liu, Chen Zhang, Zhan Qin, Kui Ren | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
KryptoPilot: An Open-World Knowledge-Augmented LLM Agent for Automated Cryptographic Exploitation Authors: Xiaonan Liu, Zhihao Li, Xiao Lan, Hao Ren, Haizhou Wang, Xingshu Chen | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
A Decompilation-Driven Framework for Malware Detection with Large Language Models Authors: Aniesh Chawla, Udbhav Prasad | Published: 2026-01-14 2026.01.14 2026.01.16 Literature Database
DNF: Dual-Layer Nested Fingerprinting for Large Language Model Intellectual Property Protection Authors: Zhenhua Xu, Yiran Zhao, Mengting Zhong, Dezhang Kong, Changting Lin, Tong Qiao, Meng Han | Published: 2026-01-13 2026.01.13 2026.01.15 Literature Database
Evaluating Implicit Regulatory Compliance in LLM Tool Invocation via Logic-Guided Synthesis Authors: Da Song, Yuheng Huang, Boqi Chen, Tianshuo Cong, Randy Goebel, Lei Ma, Foutse Khomh | Published: 2026-01-13 2026.01.13 2026.01.15 Literature Database
SecureCAI: Injection-Resilient LLM Assistants for Cybersecurity Operations Authors: Mohammed Himayath Ali, Mohammed Aqib Abdullah, Mohammed Mudassir Uddin, Shahnawaz Alam | Published: 2026-01-12 2026.01.12 2026.01.14 Literature Database