$AutoGuardX$: A Comprehensive Cybersecurity Framework for Connected Vehicles

Authors: Muhammad Ali Nadeem, Bishwo Prakash Pokharel, Naresh Kshetri, Achyut Shankar, Gokarna Sharma | Published: 2025-08-25

Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation

Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25

MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs

Authors: Tiezhu Sun, Marco Alecci, Aleksandr Pilgun, Yewei Song, Xunzhu Tang, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-08-25

Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection

Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20

On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions

Authors: Daniel M. Jimenez-Gutierrez, Yelizaveta Falkouskaya, Jose L. Hernandez-Ramos, Aris Anagnostopoulos, Ioannis Chatzigiannakis, Andrea Vitaletti | Published: 2025-08-19

DDoS Attacks in Cloud Computing: Detection and Prevention

Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19

AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation

Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18

VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog

Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18

MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies

Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18

SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip

Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18