AgentVisor: Defending LLM Agents Against Prompt Injection via Semantic Virtualization

Authors: Zonghao Ying, Haozheng Wang, Jiangfan Liu, Quanchen Zou, Aishan Liu, Jian Yang, Yaodong Yang, Xianglong Liu | Published: 2026-04-27

An Information-Geometric Framework for Stability Analysis of Large Language Models under Entropic Stress

Authors: Hikmat Karimov, Rahid Zahid Alekberli | Published: 2026-04-27

System-aware contextual digital twin for ICS anomaly diagnosis

Authors: Eungyu Woo, Yooshin Kim, Wonje Heo, Donghoon Shin | Published: 2026-04-27

Transient Turn Injection: Exposing Stateless Multi-Turn Vulnerabilities in Large Language Models

Authors: Naheed Rayhan, Sohely Jahan | Published: 2026-04-23

Stealthy Backdoor Attacks against LLMs Based on Natural Style Triggers

Authors: Jiali Wei, Ming Fan, Guoheng Sun, Xicheng Zhang, Haijun Wang, Ting Liu | Published: 2026-04-23

A Sociotechnical, Practitioner-Centered Approach to Technology Adoption in Cybersecurity Operations: An LLM Case

Authors: Francis Hahn, Mohd Mamoon, Alexandru G. Bardas, Michael Collins, Daniel Lende, Xinming Ou, S. Raj Rajagopalan | Published: 2026-04-23

Differentially Private De-identification of Dutch Clinical Notes: A Comparative Evaluation

Authors: Michele Miranda, Xinlan Yan, Nishant Mishra, Rachel Murphy, Ameen Abu-Hanna, Sébastien Bratières, Iacer Calixto | Published: 2026-04-23

Provably Secure Steganography Based on List Decoding

Authors: Kaiyi Pang, Minhao Bai | Published: 2026-04-23

DAIRE: A lightweight AI model for real-time detection of Controller Area Network attacks in the Internet of Vehicles

Authors: Shahid Alam, Amina Jameel, Zahida Parveen, Ehab Alnfrawy, Adeela Ashraf, Raza Uddin, Jamal Aqib | Published: 2026-04-22

Towards Certified Malware Detection: Provable Guarantees Against Evasion Attacks

Authors: Nandakrishna Giri, Asmitha K. A., Serena Nicolazzo, Antonino Nocera, Vinod P | Published: 2026-04-22