Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization

Authors: Osama Al Haddad, Muhammad Ikram, Ejaz Ahmed, Young Lee | Published: 2025-10-21

One Size Fits All? A Modular Adaptive Sanitization Kit (MASK) for Customizable Privacy-Preserving Phone Scam Detection

Authors: Kangzhong Wang, Zitong Shen, Youqian Zhang, Michael MK Cheung, Xiapu Luo, Grace Ngai, Eugene Yujun Fu | Published: 2025-10-21

The Attribution Story of WhisperGate: An Academic Perspective

Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21

DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning

Authors: Yixuan Liu, Xinlei Li, Yi Li | Published: 2025-10-21

Position: LLM Watermarking Should Align Stakeholders’ Incentives for Practical Adoption

Authors: Yepeng Liu, Xuandong Zhao, Dawn Song, Gregory W. Wornell, Yuheng Bu | Published: 2025-10-21

RESCUE: Retrieval Augmented Secure Code Generation

Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21

PLAGUE: Plug-and-play framework for Lifelong Adaptive Generation of Multi-turn Exploits

Authors: Neeladri Bhuiya, Madhav Aggarwal, Diptanshu Purwar | Published: 2025-10-20 | Updated: 2025-10-22

VERA-V: Variational Inference Framework for Jailbreaking Vision-Language Models

Authors: Qilin Liao, Anamika Lochab, Ruqi Zhang | Published: 2025-10-20

CrossGuard: Safeguarding MLLMs against Joint-Modal Implicit Malicious Attacks

Authors: Xu Zhang, Hao Li, Zhichao Lu | Published: 2025-10-20

GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with Denoising Models

Authors: Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento | Published: 2025-10-20