Benchmarking Safety Risks of Knowledge-Intensive Reasoning under Malicious Knowledge Editing

Authors: Qinghua Mao, Xi Lin, Jinze Gu, Jun Wu, Siyuan Li, Yuliang Chen | Published: 2026-05-11

Usability as a Weapon: Attacking the Safety of LLM-Based Code Generation via Usability Requirements

Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Yechao Zhang, Yating Liu, Fengyuan Xu, Sheng Zhong | Published: 2026-05-11

Sketch-based Access Control: A Multimodal Interface for Translating User Preferences into Intent-Aligned Policies

Authors: Kyzyl Monteiro, Sauvik Das | Published: 2026-05-11

Probabilistic-bit Guided CDCL for SAT Solving using Ising Consensus Assumptions

Authors: Melki Bino | Published: 2026-05-05

Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software

Authors: Shravya Kanchi, Xiaoyan Zang, Ying Zhang, Danfeng Yao, Na Meng | Published: 2026-05-05

KVerus: Scalable and Resilient Formal Verification Proof Generation for Rust Code

Authors: Yuwei Liu, Xinyi Wan, Yanhao Wang, Minghua Wang, Lin Huang, Tao Wei | Published: 2026-05-05

GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer

Authors: Chris S. Lin, Yuqin Yan, Guozhen Ding, Joyce Qu, Joseph Zhu, David Lie, Gururaj Saileshwar | Published: 2026-05-05

Bandits attack function optimization

Authors: Philippe Preux, Rémi Munos, Michal Valko | Published: 2026-05-05

Exposing LLM Safety Gaps Through Mathematical Encoding:New Attacks and Systematic Analysis

Authors: Haoyu Zhang, Mohammad Zandsalimy, Shanu Sushmita | Published: 2026-05-05

ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection

Authors: Shihao Weng, Yang Feng, Jinrui Zhang, Xiaofei Xie, Jiongchi Yu, Jia Liu | Published: 2026-05-05