DualGuard: Dual-stream Large Language Model Watermarking Defense against Paraphrase and Spoofing Attack

Authors: Hao Li, Yubing Ren, Yanan Cao, Yingjie Li, Fang Fang, Shi Wang, Li Guo | Published: 2025-12-18

ContextLeak: Auditing Leakage in Private In-Context Learning Methods

Authors: Jacob Choi, Shuying Cao, Xingjian Dong, Wang Bill Zhu, Robin Jia, Sai Praneeth Karimireddy | Published: 2025-12-18

FAME: FPGA Acceleration of Secure Matrix Multiplication with Homomorphic Encryption

Authors: Zhihan Xu, Rajgopal Kannan, Viktor K. Prasanna | Published: 2025-12-17

How Do Semantically Equivalent Code Transformations Impact Membership Inference on LLMs for Code?

Authors: Hua Yang, Alejandro Velasco, Thanh Le-Cong, Md Nazmul Haque, Bowen Xu, Denys Poshyvanyk | Published: 2025-12-17

Remotely Detectable Robot Policy Watermarking

Authors: Michael Amir, Manon Flageat, Amanda Prorok | Published: 2025-12-17

Quantum Machine Learning for Cybersecurity: A Taxonomy and Future Directions

Authors: Siva Sai, Ishika Goyal, Shubham Sharma, Sri Harshita Manuri, Vinay Chamola, Rajkumar Buyya | Published: 2025-12-17

Bounty Hunter: Autonomous, Comprehensive Emulation of Multi-Faceted Adversaries

Authors: Louis Hackländer-Jansen, Rafael Uetz, Martin Henze | Published: 2025-12-17

An Efficient Gradient-Based Inference Attack for Federated Learning

Authors: Pablo Montaña-Fernández, Ines Ortega-Fernandez | Published: 2025-12-17

Quantifying Return on Security Controls in LLM Systems

Authors: Richard Helder Moulton, Austin O'Brien, John D. Hastings | Published: 2025-12-17

SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports

Authors: Sogol Masoumzadeh, Yufei Li, Shane McIntosh, Dániel Varró, Lili Wei | Published: 2025-12-17