| Authors |
Paper (Accepted) |
| Yongchao Huang, zhang pengfei, Shahzad Mumtaz |
Training data membership inference via Gaussian process meta-modeling: a post-hoc analysis approach |
| Benedikt Brückner, Alessio Lomuscio |
Improving Neural Network Robustness to Convolutional Perturbations Through Certified Training |
| Ziqing Yang, Yixin Wu, Rui Wen, Michael Backes, Yang Zhang |
Peering Behind the Shield: Guardrail Identification in Large Language Models |
| Dinil Mon Divakaran |
Traffic Modeling for Network Security and Privacy: Challenges Ahead |
| Víctor Mayoral-Vilches, Luis Javier Navarrete Lozano, María Sanz-Gómez, Lidia Espejo Salas, Martiño Crespo Álvarez, Francisco Oca González, Francesco Balassone, Alfonso Glera-Picón, Unai Ayucar Carbajo, Jon Ander Ruiz-Alcalde, Stefan Rass, Martin Pinzger, Endika Gil-Uriarte |
Cybersecurity AI (CAI): An open framework for AI Security |
| Francesco Balassone, Víctor Mayoral-Vilches, Stefan Rass, Martin Pinzger, Gaetano Perrone, Simon Pietro Romano, Peter Schartner |
Cybersecurity AI: Evaluating Agentic Cybersecurity in Attack/Defense CTFs |
| Víctor Mayoral-Vilches, Andreas Makris, Kevin Finisterre |
Cybersecurity AI: Humanoid Robots as Attack Vectors and How to Defend Them |
| Vishal Pramanik, Maisha Maliha, Susmit Jha, Sumit Kumar Jha |
Jailbreaking the Security of LLMs: How Targeted Nullspace Perturbations Unmask Hidden Vulnerabilities |
| Arth Bhardwaj, Nirav Diwan, Gang Wang |
Beyond BeautifulSoup: Benchmarking LLM-Powered Web Scraping for Everyday Users |
| Sayak Mukherjee, Samrat Chatterjee, Emilie Purvine, Ted Fujimoto, Tegan Emerson |
Large Language Model-Based Reward Design for Deep Reinforcement Learning-Driven Autonomous Cyber Defense |
| Bahirah Adewunmi, Edward Raff, Sanjay Purushotham |
SubstratumGraphEnv: Reinforcement Learning Environment (RLE) for Modeling System Attack Paths |
| Vishal Pramanik, Olivera Kotevska, Alvaro Velasquez, Susmit Jha, Sumit Kumar Jha |
SPUN: Spectral Projection–based UNlearning in Hyperdimensional Computing |
| Vishal Pramanik, Alvaro Velasquez, Susmit Jha, Sumit Kumar Jha |
Fact or Hallucination? An Entropy-Based Framework for Attention-Wise Usable Information in LLMs |
| Dehami Kiryu, Atsushi Takabatake, Takaharu Yaguchi |
Robustness of Operator Learning Methods with MLP-Based Kolmogorov-Arnold Networks |
| Vaibhav Shukla, Hardik Sharma, Adith N Reganti, Soham Wasmatkar, Bagesh Kumar, Vrijendra Singh |
Lost in Translation? A Comparative Study on the Cross-Lingual Transfer of Composite Harms |
| rui sang, Yuxuan Liu |
SceneGuard: Training-Time Voice Protection with Scene-Consistent Audible Background Noise |
| Larry Milner |
Orchestrating Cybersecurity Tools: An AI Agent for Automated Malware Triage and Attribution |
| Bhagyesh Kumar, A S Aravinthakshan, Akshat Satyanarayan, Ishaan Gakhar, Ujjwal Verma |
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models |