Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study

Authors: James C. Ward, Alex Bott, Connor York, Edmund R. Hunt | Published: 2025-09-15

NeuroStrike: Neuron-Level Attacks on Aligned LLMs

Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-09-15

An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks

Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15

Inducing Uncertainty for Test-Time Privacy

Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15

Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution

Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15

Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector

Authors: Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirmare, Vivek Balachandran, Tamal Das | Published: 2025-09-11

What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion Detection Datasets

Authors: Meghan Wilkinson, Robert H Thomson | Published: 2025-09-11

ENSI: Efficient Non-Interactive Secure Inference for Large Language Models

Authors: Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu | Published: 2025-09-11

What You Code Is What We Prove: Translating BLE App Logic into Formal Models with LLMs for Vulnerability Detection

Authors: Biwei Yan, Yue Zhang, Minghui Xu, Runyu Pan, Jinku Li, Xiuzhen Cheng | Published: 2025-09-11

Enabling Regulatory Multi-Agent Collaboration: Architecture, Challenges, and Solutions

Authors: Qinnan Hu, Yuntao Wang, Yuan Gao, Zhou Su, Linkang Du | Published: 2025-09-11