CyberThreat-Eval: Can Large Language Models Automate Real-World Threat Research?

Authors: Xiangsen Chen, Xuan Feng, Shuo Chen, Matthieu Maitre, Sudipto Rakshit, Diana Duvieilh, Ashley Picone, Nan Tang | Published: 2026-03-10

FlexServe: A Fast and Secure LLM Serving System for Mobile Devices with Flexible Resource Isolation

Authors: Yinpeng Wu, Yitong Chen, Lixiang Wang, Jinyu Gu, Zhichao Hua, Yubin Xia | Published: 2026-03-10

SCAFFOLD-CEGIS: Preventing Latent Security Degradation in LLM-Driven Iterative Code Refinement

Authors: Yi Chen, Yun Bian, Haiquan Wang, Shihao Li, Zhe Cui | Published: 2026-03-09

Lambda-randomization: multi-dimensional randomized response made easy

Authors: Nicolas Ruiz | Published: 2026-03-05

Good-Enough LLM Obfuscation (GELO)

Authors: Anatoly Belikov, Ilya Fedotov | Published: 2026-03-05

Efficient Privacy-Preserving Sparse Matrix-Vector Multiplication Using Homomorphic Encryption

Authors: Yang Gao, Gang Quan, Wujie Wen, Scott Piersall, Qian Lou, Liqiang Wang | Published: 2026-03-05

Robustness of Agentic AI Systems via Adversarially-Aligned Jacobian Regularization

Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2026-03-04

PTOPOFL: Privacy-Preserving Personalised Federated Learning via Persistent Homology

Authors: Kelly L Vomo-Donfack, Adryel Hoszu, Grégory Ginot, Ian Morilla | Published: 2026-03-04

CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security Alerts

Authors: Max Landauer, Wolfgang Hotwagner, Thorina Boenke, Florian Skopik, Markus Wurzenberger | Published: 2026-03-04

A Multi-Dimensional Quality Scoring Framework for Decentralized LLM Inference with Proof of Quality

Authors: Arther Tian, Alex Ding, Frank Chen, Simon Wu, Aaron Chan | Published: 2026-03-04