A Unified Evaluation of Learning-Based Similarity Techniques for Malware Detection

Authors: Udbhav Prasad, Aniesh Chawla | Published: 2026-02-17

Exposing the Systematic Vulnerability of Open-Weight Models to Prefill Attacks

Authors: Lukas Struppek, Adam Gleave, Kellin Pelrine | Published: 2026-02-16

LRD-MPC: Efficient MPC Inference through Low-rank Decomposition

Authors: Tingting Tang, Yongqin Wang, Murali Annavaram | Published: 2026-02-16

Differentially Private Retrieval-Augmented Generation

Authors: Tingting Tang, James Flemings, Yongqin Wang, Murali Annavaram | Published: 2026-02-16

Unknown Attack Detection in IoT Networks using Large Language Models: A Robust, Data-efficient Approach

Authors: Shan Ali, Feifei Niu, Paria Shirani, Lionel C. Briand | Published: 2026-02-12

BlackCATT: Black-box Collusion Aware Traitor Tracing in Federated Learning

Authors: Elena Rodríguez-Lois, Fabio Brau, Maura Pintor, Battista Biggio, Fernando Pérez-González | Published: 2026-02-12

DeepSight: An All-in-One LM Safety Toolkit

Authors: Bo Zhang, Jiaxuan Guo, Lijun Li, Dongrui Liu, Sujin Chen, Guanxu Chen, Zhijie Zheng, Qihao Lin, Lewen Yan, Chen Qian, Yijin Zhou, Yuyao Wu, Shaoxiong Guo, Tianyi Du, Jingyi Yang, Xuhao Hu, Ziqi Miao, Xiaoya Lu, Jing Shao, Xia Hu | Published: 2026-02-12

PAC to the Future: Zero-Knowledge Proofs of PAC Private Systems

Authors: Guilhem Repetto, Nojan Sheybani, Gabrielle De Micheli, Farinaz Koushanfar | Published: 2026-02-12

More Haste, Less Speed: Weaker Single-Layer Watermark Improves Distortion-Free Watermark Ensembles

Authors: Ruibo Chen, Yihan Wu, Xuehao Cui, Jingqi Zhang, Heng Huang | Published: 2026-02-12

LoRA-based Parameter-Efficient LLMs for Continuous Learning in Edge-based Malware Detection

Authors: Christian Rondanini, Barbara Carminati, Elena Ferrari, Niccolò Lardo, Ashish Kundu | Published: 2026-02-12