LLM-FS: Zero-Shot Feature Selection for Effective and Interpretable Malware Detection

Authors: Naveen Gill, Ajvad Haneef K, Madhu Kumar S D | Published: 2026-02-10

Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks

Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10

When Handshakes Tell the Truth: Detecting Web Bad Bots via TLS Fingerprints

Authors: Ghalia Jarad, Kemal Bicakci | Published: 2026-02-10

ReSIM: Re-ranking Binary Similarity Embeddings to Improve Function Search Performance

Authors: Gianluca Capozzi, Anna Paola Giancaspro, Fabio Petroni, Leonardo Querzoni, Giuseppe Antonio Di Luna | Published: 2026-02-10

A Behavioral Fingerprint for Large Language Models: Provenance Tracking via Refusal Vectors

Authors: Zhenyu Xu, Victor S. Sheng | Published: 2026-02-10

LLMAC: A Global and Explainable Access Control Framework with Large Language Model

Authors: Sharif Noor Zisad, Ragib Hasan | Published: 2026-02-10

CIC-Trap4Phish: A Unified Multi-Format Dataset for Phishing and Quishing Attachment Detection

Authors: Fatemeh Nejati, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali A. Ghorbani, Sajjad Dadkhah | Published: 2026-02-09

Is Reasoning Capability Enough for Safety in Long-Context Language Models?

Authors: Yu Fu, Haz Sameen Shahgir, Huanli Gong, Zhipeng Wei, N. Benjamin Erichson, Yue Dong | Published: 2026-02-09

HoGS: Homophily-Oriented Graph Synthesis for Local Differentially Private GNN Training

Authors: Wen Xu, Zhetao Li, Yong Xiao, Pengpeng Qiao, Mianxiong Dong, Kaoru Ota | Published: 2026-02-09

Empirical Evaluation of SMOTE in Android Malware Detection with Machine Learning: Challenges and Performance in CICMalDroid 2020

Authors: Diego Ferreira Duarte, Andre Augusto Bortoli | Published: 2026-02-09