QShield: Securing Neural Networks Against Adversarial Attacks using Quantum Circuits

Authors: Navid Azimi, Aditya Prakash, Yao Wang, Li Xiong | Published: 2026-04-13

Beyond A Fixed Seal: Adaptive Stealing Watermark in Large Language Models

Authors: Shuhao Zhang, Yuli Chen, Jiale Han, Bo Cheng, Jiabao Ma | Published: 2026-04-13

Vulnerability Detection with Interprocedural Context in Multiple Languages: Assessing Effectiveness and Cost of Modern LLMs

Authors: Kevin Lira, Baldoino Fonseca, Davy Baía, Márcio Ribeiro, Wesley K. G. Assunção | Published: 2026-04-09

Your Agent Is Mine: Measuring Malicious Intermediary Attacks on the LLM Supply Chain

Authors: Hanzhi Liu, Chaofan Shou, Hongbo Wen, Yanju Chen, Ryan Jingyang Fang, Yu Feng | Published: 2026-04-09

Securing Retrieval-Augmented Generation: A Taxonomy of Attacks, Defenses, and Future Directions

Authors: Yuming Xu, Mingtao Zhang, Zhuohan Ge, Haoyang Li, Nicole Hu, Jason Chen Zhang, Qing Li, Lei Chen | Published: 2026-04-09

Towards Identification and Intervention of Safety-Critical Parameters in Large Language Models

Authors: Weiwei Qi, Zefeng Wu, Tianhang Zheng, Zikang Zhang, Xiaojun Jia, Zhan Qin, Kui Ren | Published: 2026-04-09

The Art of (Mis)alignment: How Fine-Tuning Methods Effectively Misalign and Realign LLMs in Post-Training

Authors: Rui Zhang, Hongwei Li, Yun Shen, Xinyue Shen, Wenbo Jiang, Guowen Xu, Yang Liu, Michael Backes, Yang Zhang | Published: 2026-04-09

On the Price of Privacy for Language Identification and Generation

Authors: Xiaoyu Li, Andi Han, Jiaojiao Jiang, Junbin Gao | Published: 2026-04-08

TraceSafe: A Systematic Assessment of LLM Guardrails on Multi-Step Tool-Calling Trajectories

Authors: Yen-Shan Chen, Sian-Yao Huang, Cheng-Lin Yang, Yun-Nung Chen | Published: 2026-04-08

VulGD: A LLM-Powered Dynamic Open-Access Vulnerability Graph Database

Authors: Luat Do, Jiao Yin, Jinli Cao, Hua Wang | Published: 2026-04-08