CAPID: Context-Aware PII Detection for Question-Answering Systems

Authors: Mariia Ponomarenko, Sepideh Abedini, Masoumeh Shafieinejad, D. B. Emerson, Shubhankar Mohapatra, Xi He | Published: 2026-02-10

Focus Session: LLM4PQC — An Agentic Framework for Accurate and Efficient Synthesis of PQC Cores

Authors: Buddhi Perera, Zeng Wang, Weihua Xiao, Mohammed Nabeel, Ozgur Sinanoglu, Johann Knechtel, Ramesh Karri | Published: 2026-02-10

QRS: A Rule-Synthesizing Neuro-Symbolic Triad for Autonomous Vulnerability Discovery

Authors: George Tsigkourakos, Constantinos Patsakis | Published: 2026-02-10

LLM-FS: Zero-Shot Feature Selection for Effective and Interpretable Malware Detection

Authors: Naveen Gill, Ajvad Haneef K, Madhu Kumar S D | Published: 2026-02-10

Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks

Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10

When Handshakes Tell the Truth: Detecting Web Bad Bots via TLS Fingerprints

Authors: Ghalia Jarad, Kemal Bicakci | Published: 2026-02-10

ReSIM: Re-ranking Binary Similarity Embeddings to Improve Function Search Performance

Authors: Gianluca Capozzi, Anna Paola Giancaspro, Fabio Petroni, Leonardo Querzoni, Giuseppe Antonio Di Luna | Published: 2026-02-10

A Behavioral Fingerprint for Large Language Models: Provenance Tracking via Refusal Vectors

Authors: Zhenyu Xu, Victor S. Sheng | Published: 2026-02-10

LLMAC: A Global and Explainable Access Control Framework with Large Language Model

Authors: Sharif Noor Zisad, Ragib Hasan | Published: 2026-02-10

CIC-Trap4Phish: A Unified Multi-Format Dataset for Phishing and Quishing Attachment Detection

Authors: Fatemeh Nejati, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali A. Ghorbani, Sajjad Dadkhah | Published: 2026-02-09