RobPI: Robust Private Inference against Malicious Client

Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23

Dirichlet Scale Mixture Priors for Bayesian Neural Networks

Authors: August Arnstad, Leiv Rønneberg, Geir Storvik | Published: 2026-02-23

LLM-enabled Applications Require System-Level Threat Monitoring

Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23

An Explainable Memory Forensics Approach for Malware Analysis

Authors: Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto | Published: 2026-02-23

SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models

Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23

Efficient Multi-Party Secure Comparison over Different Domains with Preprocessing Assistance

Authors: Kaiwen Wang, Xiaolin Chang, Yuehan Dong, Ruichen Zhang | Published: 2026-02-23

Agentic AI as a Cybersecurity Attack Surface: Threats, Exploits, and Defenses in Runtime Supply Chains

Authors: Xiaochong Jiang, Shiqi Yang, Wenting Yang, Yichen Liu, Cheng Ji | Published: 2026-02-23

Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments

Authors: Kunal Mukherjee | Published: 2026-02-23

Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge

Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19

What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else?

Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19