VulGD: A LLM-Powered Dynamic Open-Access Vulnerability Graph Database

Authors: Luat Do, Jiao Yin, Jinli Cao, Hua Wang | Published: 2026-04-08

Data Leakage in Automotive Perception: Practitioners’ Insights

Authors: Md Abu Ahammed Babu, Sushant Kumar Pandey, Darko Durisic, Andras Balint, Miroslaw Staron | Published: 2026-04-08

SentinelSphere: Integrating AI-Powered Real-Time Threat Detection with Cybersecurity Awareness Training

Authors: Nikolaos D. Tantaroudas, Ilias Karachalios, Andrew J. McCracken | Published: 2026-04-08

MirageBackdoor: A Stealthy Attack that Induces Think-Well-Answer-Wrong Reasoning

Authors: Yizhe Zeng, Wei Zhang, Yunpeng Li, Juxin Xiao, Xiao Wang, Yuling Liu | Published: 2026-04-08

Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection

Authors: Zi Liang, Qipeng Xie, Jun He, Bohuan Xue, Weizheng Wang, Yuandao Cai, Fei Luo, Boxian Zhang, Haibo Hu, Kaishun Wu | Published: 2026-04-08

PoC-Adapt: Semantic-Aware Automated Vulnerability Reproduction with LLM Multi-Agents and Reinforcement Learning-Driven Adaptive Policy

Authors: Phan The Duy, Nguyen Viet Duy, Khoa Ngo-Khanh, Nguyen Huu Quyen, Van-Hau Pham | Published: 2026-04-08

Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box Threats

Authors: Adrian Shuai Li, Md Ajwad Akil, Elisa Bertino | Published: 2026-04-08

WebSP-Eval: Evaluating Web Agents on Website Security and Privacy Tasks

Authors: Guruprasad Viswanathan Ramesh, Asmit Nayak, Basieem Siddique, Kassem Fawaz | Published: 2026-04-07

Blockchain and AI: Securing Intelligent Networks for the Future

Authors: Joy Dutta, Hossien B. Eldeeb, Tu Dac Ho | Published: 2026-04-07

FedSpy-LLM: Towards Scalable and Generalizable Data Reconstruction Attacks from Gradients on LLMs

Authors: Syed Irfan Ali Meerza, Feiyi Wang, Jian Liu | Published: 2026-04-07