Functional Subspace Watermarking for Large Language Models

Authors: Zikang Ding, Junhao Li, Suling Wu, Junchi Yao, Hongbo Liu, Lijie Hu | Published: 2026-03-19

Measuring and Exploiting Confirmation Bias in LLM-Assisted Security Code Review

Authors: Dimitris Mitropoulos, Nikolaos Alexopoulos, Georgios Alexopoulos, Diomidis Spinellis | Published: 2026-03-19

CNT: Safety-oriented Function Reuse across LLMs via Cross-Model Neuron Transfer

Authors: Yue Zhao, Yujia Gong, Ruigang Liang, Shenchen Zhu, Kai Chen, Xuejing Yuan, Wangjun Zhang | Published: 2026-03-19

Prompt Control-Flow Integrity: A Priority-Aware Runtime Defense Against Prompt Injection in LLM Systems

Authors: Md Takrim Ul Alam, Akif Islam, Mohd Ruhul Ameen, Abu Saleh Musa Miah, Jungpil Shin | Published: 2026-03-19

PlanTwin: Privacy-Preserving Planning Abstractions for Cloud-Assisted LLM Agents

Authors: Guangsheng Yu, Qin Wang, Rui Lang, Shuai Su, Xu Wang | Published: 2026-03-19

Differential Privacy in Generative AI Agents: Analysis and Optimal Tradeoffs

Authors: Ya-Ting Yang, Quanyan Zhu | Published: 2026-03-18

Machine Learning for Network Attacks Classification and Statistical Evaluation of Machine Learning for Network Attacks Classification and Adversarial Learning Methodologies for Synthetic Data Generation

Authors: Iakovos-Christos Zarkadis, Christos Douligeris | Published: 2026-03-18

rSDNet: Unified Robust Neural Learning against Label Noise and Adversarial Attacks

Authors: Suryasis Jana, Abhik Ghosh | Published: 2026-03-18

DDH-based schemes for multi-party Function Secret Sharing

Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2026-03-18

Caging the Agents: A Zero Trust Security Architecture for Autonomous AI in Healthcare

Authors: Saikat Maiti | Published: 2026-03-18