Large Language Models Are Effective Code Watermarkers

Authors: Rui Xu, Jiawei Chen, Zhaoxia Yin, Cong Kong, Xinpeng Zhang | Published: 2025-10-13

Evaluating Line-level Localization Ability of Learning-based Code Vulnerability Detection Models

Authors: Marco Pintore, Giorgio Piras, Angelo Sotgiu, Maura Pintor, Battista Biggio | Published: 2025-10-13

TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code

Authors: Alexander Sternfeld, Andrei Kucharavy, Ljiljana Dolamic | Published: 2025-10-13

CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense

Authors: Yang Zhuochen, Fok Kar Wai, Thing Vrizlynn | Published: 2025-10-13

Secret-Protected Evolution for Differentially Private Synthetic Text Generation

Authors: Tianze Wang, Zhaoyu Chen, Jian Du, Yingtai Xiao, Linjun Zhang, Qiang Yan | Published: 2025-10-13

Adversarial Robustness in One-Stage Learning-to-Defer

Authors: Yannis Montreuil, Letian Yu, Axel Carlier, Lai Xing Ng, Wei Tsang Ooi | Published: 2025-10-13

Neutral Agent-based Adversarial Policy Learning against Deep Reinforcement Learning in Multi-party Open Systems

Authors: Qizhou Peng, Yang Zheng, Yu Wen, Yanna Wu, Yingying Du | Published: 2025-10-13

Quantifying Information Disclosure During Gradient Descent Using Gradient Uniqueness

Authors: Mahmoud Abdelghafar, Maryam Aliakbarpour, Chris Jermaine | Published: 2025-10-13

New Machine Learning Approaches for Intrusion Detection in ADS-B

Authors: Mikaëla Ngamboé, Jean-Simon Marrocco, Jean-Yves Ouattara, José M. Fernandez, Gabriela Nicolescu | Published: 2025-10-09

LLM-Assisted Web Measurements

Authors: Simone Bozzolan, Stefano Calzavara, Lorenzo Cazzaro | Published: 2025-10-09