Prompt Control-Flow Integrity: A Priority-Aware Runtime Defense Against Prompt Injection in LLM Systems

Authors: Md Takrim Ul Alam, Akif Islam, Mohd Ruhul Ameen, Abu Saleh Musa Miah, Jungpil Shin | Published: 2026-03-19

PlanTwin: Privacy-Preserving Planning Abstractions for Cloud-Assisted LLM Agents

Authors: Guangsheng Yu, Qin Wang, Rui Lang, Shuai Su, Xu Wang | Published: 2026-03-19

Differential Privacy in Generative AI Agents: Analysis and Optimal Tradeoffs

Authors: Ya-Ting Yang, Quanyan Zhu | Published: 2026-03-18

Machine Learning for Network Attacks Classification and Statistical Evaluation of Machine Learning for Network Attacks Classification and Adversarial Learning Methodologies for Synthetic Data Generation

Authors: Iakovos-Christos Zarkadis, Christos Douligeris | Published: 2026-03-18

rSDNet: Unified Robust Neural Learning against Label Noise and Adversarial Attacks

Authors: Suryasis Jana, Abhik Ghosh | Published: 2026-03-18

DDH-based schemes for multi-party Function Secret Sharing

Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2026-03-18

Caging the Agents: A Zero Trust Security Architecture for Autonomous AI in Healthcare

Authors: Saikat Maiti | Published: 2026-03-18

Federated Computing as Code (FCaC): Sovereignty-aware Systems by Design

Authors: Enzo Fenoglio, Philip Treleaven | Published: 2026-03-18

Network- and Device-Level Cyber Deception for Contested Environments Using RL and LLMs

Authors: Abhijeet Sahu, Shuva Paul, Rochard Macwan | Published: 2026-03-18

Deanonymizing Bitcoin Transactions via Network Traffic Analysis with Semi-supervised Learning

Authors: Shihan Zhang, Bing Han, Chuanyong Tian, Ruisheng Shi, Lina Lan, Qin Wang | Published: 2026-03-18