SLIM: Stealthy Low-Coverage Black-Box Watermarking via Latent-Space Confusion Zones

Authors: Hengyu Wu, Yang Cao | Published: 2026-01-06

LLMs, You Can Evaluate It! Design of Multi-perspective Report Evaluation for Security Operation Centers

Authors: Hiroyuki Okada, Tatsumi Oba, Naoto Yanai | Published: 2026-01-06

JPU: Bridging Jailbreak Defense and Unlearning via On-Policy Path Rectification

Authors: Xi Wang, Songlei Jian, Shasha Li, Xiaopeng Li, Zhaoye Li, Bin Ji, Baosheng Wang, Jie Yu | Published: 2026-01-06

Window-based Membership Inference Attacks Against Fine-tuned Large Language Models

Authors: Yuetian Chen, Yuntao Du, Kaiyuan Zhang, Ashish Kundu, Charles Fleming, Bruno Ribeiro, Ninghui Li | Published: 2026-01-06

Adversarial Contrastive Learning for LLM Quantization Attacks

Authors: Dinghong Song, Zhiwei Xu, Hai Wan, Xibin Zhao, Pengfei Su, Dong Li | Published: 2026-01-06

LAsset: An LLM-assisted Security Asset Identification Framework for System-on-Chip (SoC) Verification

Authors: Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan, Nashmin Alam, Azim Uddin, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-01-06

Quantum AI for Cybersecurity: A hybrid Quantum-Classical models for attack path analysis

Authors: Jessica A. Sciammarelli, Waqas Ahmed | Published: 2026-01-05

UnPII: Unlearning Personally Identifiable Information with Quantifiable Exposure Risk

Authors: Intae Jeon, Yujeong Kwon, Hyungjoon Koo | Published: 2026-01-05

Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation

Authors: Heba Osama, Omar Elebiary, Youssef Qassim, Mohamed Amgad, Ahmed Maghawry, Ahmed Saafan, Haitham Ghalwash | Published: 2025-12-29

Toward Trustworthy Agentic AI: A Multimodal Framework for Preventing Prompt Injection Attacks

Authors: Toqeer Ali Syed, Mishal Ateeq Almutairi, Mahmoud Abdel Moaty | Published: 2025-12-29