Compiling Activation Steering into Weights via Null-Space Constraints for Stealthy Backdoors

Authors: Rui Yin, Tianxu Han, Naen Xu, Changjiang Li, Ping He, Chunyi Zhou, Jun Wang, Zhihui Fu, Tianyu Du, Jinbao Li, Shouling Ji | Published: 2026-04-14

UniDetect: LLM-Driven Universal Fraud Detection across Heterogeneous Blockchains

Authors: Shuyi Miao, Wangjie Qiu, Shengda Zhuo, Fei Shen, Dan Lin, Xingtong Yu, Chua Tat-Seng, Zhiming Zheng | Published: 2026-04-14

TEMPLATEFUZZ: Fine-Grained Chat Template Fuzzing for Jailbreaking and Red Teaming LLMs

Authors: Qingchao Shen, Zibo Xiao, Lili Huang, Enwei Hu, Yongqiang Tian, Junjie Chen | Published: 2026-04-14

From IOCs to Regex: Automating CTI Operationalization for SOC with LLMs

Authors: Pei-Yu Tseng, Lan Zhang, ZihDwo Yeh, Xiaoyan Sun, Xushu Dai, Peng Liu | Published: 2026-04-14

TimeMark: A Trustworthy Time Watermarking Framework for Exact Generation-Time Recovery from AIGC

Authors: Shangkun Che, Silin Du, Ge Gao | Published: 2026-04-14

Fully Homomorphic Encryption on Llama 3 model for privacy preserving LLM inference

Authors: Anes Abdennebi, Nadjia Kara, Laaziz Lahlou | Published: 2026-04-14

ClawGuard: A Runtime Security Framework for Tool-Augmented LLM Agents Against Indirect Prompt Injection

Authors: Wei Zhao, Zhe Li, Peixin Zhang, Jun Sun | Published: 2026-04-13

Towards Automated Pentesting with Large Language Models

Authors: Ricardo Bessa, Rui Claro, João Trindade, João Lourenço | Published: 2026-04-13

A Synthetic Conversational Smishing Dataset for Social Engineering Detection

Authors: Carl Lochstampfor, Ayan Roy | Published: 2026-04-13

GPU Acceleration of Sparse Fully Homomorphic Encrypted DNNs

Authors: Lara D'Agata, Carlos Agulló-Domingo, Óscar Vera-López, Kaustubh Shivdikar, Ardhi W. B. Yudha, Ferhat Yaman, David Kaeli, José L. Abellán, Ian Colbert, José Cano | Published: 2026-04-13