The Art of (Mis)alignment: How Fine-Tuning Methods Effectively Misalign and Realign LLMs in Post-Training

Authors: Rui Zhang, Hongwei Li, Yun Shen, Xinyue Shen, Wenbo Jiang, Guowen Xu, Yang Liu, Michael Backes, Yang Zhang | Published: 2026-04-09

On the Price of Privacy for Language Identification and Generation

Authors: Xiaoyu Li, Andi Han, Jiaojiao Jiang, Junbin Gao | Published: 2026-04-08

TraceSafe: A Systematic Assessment of LLM Guardrails on Multi-Step Tool-Calling Trajectories

Authors: Yen-Shan Chen, Sian-Yao Huang, Cheng-Lin Yang, Yun-Nung Chen | Published: 2026-04-08

VulGD: A LLM-Powered Dynamic Open-Access Vulnerability Graph Database

Authors: Luat Do, Jiao Yin, Jinli Cao, Hua Wang | Published: 2026-04-08

Data Leakage in Automotive Perception: Practitioners’ Insights

Authors: Md Abu Ahammed Babu, Sushant Kumar Pandey, Darko Durisic, Andras Balint, Miroslaw Staron | Published: 2026-04-08

SentinelSphere: Integrating AI-Powered Real-Time Threat Detection with Cybersecurity Awareness Training

Authors: Nikolaos D. Tantaroudas, Ilias Karachalios, Andrew J. McCracken | Published: 2026-04-08

MirageBackdoor: A Stealthy Attack that Induces Think-Well-Answer-Wrong Reasoning

Authors: Yizhe Zeng, Wei Zhang, Yunpeng Li, Juxin Xiao, Xiao Wang, Yuling Liu | Published: 2026-04-08

Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection

Authors: Zi Liang, Qipeng Xie, Jun He, Bohuan Xue, Weizheng Wang, Yuandao Cai, Fei Luo, Boxian Zhang, Haibo Hu, Kaishun Wu | Published: 2026-04-08

PoC-Adapt: Semantic-Aware Automated Vulnerability Reproduction with LLM Multi-Agents and Reinforcement Learning-Driven Adaptive Policy

Authors: Phan The Duy, Nguyen Viet Duy, Khoa Ngo-Khanh, Nguyen Huu Quyen, Van-Hau Pham | Published: 2026-04-08

Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box Threats

Authors: Adrian Shuai Li, Md Ajwad Akil, Elisa Bertino | Published: 2026-04-08