Blockchain and AI: Securing Intelligent Networks for the Future

Authors: Joy Dutta, Hossien B. Eldeeb, Tu Dac Ho | Published: 2026-04-07

FedSpy-LLM: Towards Scalable and Generalizable Data Reconstruction Attacks from Gradients on LLMs

Authors: Syed Irfan Ali Meerza, Feiyi Wang, Jian Liu | Published: 2026-04-07

LLM4CodeRE: Generative AI for Code Decompilation Analysis and Reverse Engineering

Authors: Hamed Jelodar, Samita Bai, Tochukwu Emmanuel Nwankwo, Parisa Hamedi, Mohammad Meymani, Roozbeh Razavi-Far, Ali A. Ghorbani | Published: 2026-04-07

CritBench: A Framework for Evaluating Cybersecurity Capabilities of Large Language Models in IEC 61850 Digital Substation Environments

Authors: Gustav Keppler, Moritz Gstür, Veit Hagenmeyer | Published: 2026-04-07

A Formal Security Framework for MCP-Based AI Agents: Threat Taxonomy, Verification Models, and Defense Mechanisms

Authors: Nirajan Acharya, Gaurav Kumar Gupta | Published: 2026-04-07

Swiss-Bench 003: Evaluating LLM Reliability and Adversarial Security for Swiss Regulatory Contexts

Authors: Fatih Uenal | Published: 2026-04-07

ClawLess: A Security Model of AI Agents

Authors: Hongyi Lu, Nian Liu, Shuai Wang, Fengwei Zhang | Published: 2026-04-07

Hackers or Hallucinators? A Comprehensive Analysis of LLM-Based Automated Penetration Testing

Authors: Jiaren Peng, Zeqin Li, Chang You, Yan Wang, Hanlin Sun, Xuan Tian, Shuqiao Zhang, Junyi Liu, Jianguo Zhao, Renyang Liu, Haoran Ou, Yuqiang Sun, Jiancheng Zhang, Yutong Jiao, Kunshu Song, Chao Zhang, Fan Shi, Hongda Sun, Rui Yan, Cheng Huang | Published: 2026-04-07

Foundations for Agentic AI Investigations from the Forensic Analysis of OpenClaw

Authors: Jan Gruber, Jan-Niclas Hilgert | Published: 2026-04-07

Towards the Development of an LLM-Based Methodology for Automated Security Profiling in Compliance with Ukrainian Cybersecurity Regulations

Authors: Daniil Shafranskyi, Iryna Stopochkina, Mykola Ilin | Published: 2026-04-07