DP-FlogTinyLLM: Differentially private federated log anomaly detection using Tiny LLMs

Authors: Isaiah Thompson, Tanmay Sen, Ritwik Bhattacharya | Published: 2026-04-21

ProjLens: Unveiling the Role of Projectors in Multimodal Model Safety

Authors: Kun Wang, Cheng Qian, Miao Yu, Lilan Peng, Liang Lin, Jiaming Zhang, Tianyu Zhang, Yu Cheng, Yang Wang | Published: 2026-04-21

SAGE: Signal-Amplified Guided Embeddings for LLM-based Vulnerability Detection

Authors: Zhengyang Shan, Xu Qian, Jiayun Xin, Minghui Xu, Yue Zhang, Zhen Yang, Hao Wu, Xiuzhen Cheng | Published: 2026-04-21

Beyond Pattern Matching: Seven Cross-Domain Techniques for Prompt Injection Detection

Authors: Thamilvendhan Munirathinam | Published: 2026-04-20

AgenTEE: Confidential LLM Agent Execution on Edge Devices

Authors: Sina Abdollahi, Mohammad M Maheri, Javad Forough, Amir Al Sadi, Josh Millar, David Kotz, Marios Kogias, Hamed Haddadi | Published: 2026-04-20

RAVEN: Retrieval-Augmented Vulnerability Exploration Network for Memory Corruption Analysis in User Code and Binary Programs

Authors: Parteek Jamwal, Minghao Shao, Boyuan Chen, Achyuta Muthuvelan, Asini Subanya, Boubacar Ballo, Kashish Satija, Mariam Shafey, Mohamed Mahmoud, Moncif Dahaji Bouffi, Pasindu Wickramasinghe, Siyona Goel, Yaakulya Sabbani, Hakim Hacid, Mthandazo Ndhlovu, Eleanna Kafeza, Sanjay Rawat, Muhammad Shafique | Published: 2026-04-20

TitanCA: Lessons from Orchestrating LLM Agents to Discover 100+ CVEs

Authors: Ting Zhang, Yikun Li, Chengran Yang, Ratnadira Widyasari, Yue Liu, Ngoc Tan Bui, Phuc Thanh Nguyen, Yan Naing Tun, Ivana Clairine Irsan, Huu Hung Nguyen, Huihui Huang, Jinfeng Jiang, Lwin Khin Shar, Eng Lieh Ouh, David Lo, Hong Jin Kang, Yide Yin, Wen Bin Leow | Published: 2026-04-20

Privacy-Preserving Product-Quantized Approximate Nearest Neighbor Search Framework for Large-scale Datasets via A Hybrid of Fully Homomorphic Encryption and Trusted Execution Environment

Authors: Shozo Saeki, Minoru Kawahara, Hirohisa Aman | Published: 2026-04-20

Understanding Secret Leakage Risks in Code LLMs: A Tokenization Perspective

Authors: Meifang Chen, Zhe Yang, Huang Nianchen, Yizhan Huang, Yichen Li, Zihan Li, Michael R. Lyu | Published: 2026-04-20

SDLLMFuzz: Dynamic-static LLM-assisted greybox fuzzing for structured input programs

Authors: Yihao Zou, Tianming Zheng, Futai Zou, Yue Wu | Published: 2026-04-20