CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2894 articles  ·  updated every 4 hours · grows forever

2894Total
2850Full Text
May 21, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Mar 20, 2026
Access Controlled Website Interaction for Agentic AI with Delegated Critical Tasks

arXiv:2603.18197v1 Announce Type: new Abstract: Recent studies reveal gaps in delegating critical tasks to agentic AI that accesses websites on the user's behalf, primarily due to limited access contr…

arXiv AI Read →
◬ AI & Machine Learning Mar 20, 2026
TeachingCoach: A Fine-Tuned Scaffolding Chatbot for Instructional Guidance to Instructors

arXiv:2603.18189v1 Announce Type: new Abstract: Higher education instructors often lack timely and pedagogically grounded support, as scalable instructional guidance remains limited and existing tools…

arXiv AI Read →
◬ AI & Machine Learning Mar 20, 2026
Efficient Dense Crowd Trajectory Prediction Via Dynamic Clustering

arXiv:2603.18166v1 Announce Type: new Abstract: Crowd trajectory prediction plays a crucial role in public safety and management, where it can help prevent disasters such as stampedes. Recent works ad…

arXiv AI Read →
◬ AI & Machine Learning Mar 20, 2026
Don't Vibe Code, Do Skele-Code: Interactive No-Code Notebooks for Subject Matter Experts to Build Lower-Cost Agentic Workflows

arXiv:2603.18122v1 Announce Type: new Abstract: Skele-Code is a natural-language and graph-based interface for building workflows with AI agents, designed especially for less or non-technical users. I…

arXiv AI Read →
◬ AI & Machine Learning Mar 20, 2026
Adaptive Domain Models: Bayesian Evolution, Warm Rotation, and Principled Training for Geometric and Neuromorphic AI

arXiv:2603.18104v1 Announce Type: new Abstract: Prevailing AI training infrastructure assumes reverse-mode automatic differentiation over IEEE-754 arithmetic. The memory overhead of training relative …

arXiv AI Read →
◬ AI & Machine Learning Mar 20, 2026
Multi-Trait Subspace Steering to Reveal the Dark Side of Human-AI Interaction

arXiv:2603.18085v1 Announce Type: new Abstract: Recent incidents have highlighted alarming cases where human-AI interactions led to negative psychological outcomes, including mental health crises and …

arXiv AI Read →
◬ AI & Machine Learning Mar 20, 2026
Continually self-improving AI

arXiv:2603.18073v1 Announce Type: new Abstract: Modern language model-based AI systems are remarkably powerful, yet their capabilities remain fundamentally capped by their human creators in three key …

arXiv AI Read →
◬ AI & Machine Learning Mar 20, 2026
DEAF: A Benchmark for Diagnostic Evaluation of Acoustic Faithfulness in Audio Language Models

arXiv:2603.18048v1 Announce Type: new Abstract: Recent Audio Multimodal Large Language Models (Audio MLLMs) demonstrate impressive performance on speech benchmarks, yet it remains unclear whether thes…

arXiv AI Read →
◬ AI & Machine Learning Mar 20, 2026
Security awareness in LLM agents: the NDAI zone case

arXiv:2603.19011v1 Announce Type: new Abstract: NDAI zones let inventor and investor agents negotiate inside a Trusted Execution Environment (TEE) where any disclosed information is deleted if no deal…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Controller Datapath Aware Verification of Masked Hardware Generated via High Level Synthesis

arXiv:2603.18939v1 Announce Type: new Abstract: Masking is a countermeasure against Power Side Channel Attacks (PSCAs) in both software and hardware implementations of cryptographic algorithms. Compar…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Security, privacy, and agentic AI in a regulatory view: From definitions and distinctions to provisions and reflections

arXiv:2603.18914v1 Announce Type: new Abstract: The rapid proliferation of artificial intelligence (AI) technologies has led to a dynamic regulatory landscape, where legislative frameworks strive to k…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Confidential Databases Without Cryptographic Mappings

arXiv:2603.18836v1 Announce Type: new Abstract: Confidential databases (CDBs) are essential for enabling secure queries over sensitive data in untrusted cloud environments using confidential computing…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Agent Control Protocol: Admission Control for Agent Actions

arXiv:2603.18829v1 Announce Type: new Abstract: Agent Control Protocol (ACP) is a formal technical specification for governance of autonomous agents in B2B institutional environments. ACP is the admis…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Functional Subspace Watermarking for Large Language Models

arXiv:2603.18793v1 Announce Type: new Abstract: Model watermarking utilizes internal representations to protect the ownership of large language models (LLMs). However, these features inevitably underg…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Weaver: Fuzzing JavaScript Engines at the JavaScript-WebAssembly Boundary

arXiv:2603.18789v1 Announce Type: new Abstract: The security of modern JavaScript (JS) engines is critical since they provide the primary defense mechanism for executing untrusted code on the web. The…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
SoK: Practical Aspects of Releasing Differentially Private Graphs

arXiv:2603.18779v1 Announce Type: new Abstract: Graph data is increasingly prevalent across domains, offering analytical value but raising significant privacy concerns. Edges may encode sensitive rela…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
ClawTrap: A MITM-Based Red-Teaming Framework for Real-World OpenClaw Security Evaluation

arXiv:2603.18762v1 Announce Type: new Abstract: Autonomous web agents such as \textbf{OpenClaw} are rapidly moving into high-impact real-world workflows, but their security robustness under live netwo…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Cross-Ecosystem Vulnerability Analysis for Python Applications

arXiv:2603.18693v1 Announce Type: new Abstract: Python applications depend on native libraries that may be vendored within package distributions or installed on the host system. When vulnerabilities a…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Secure Wi-Fi Ranging Today: Security and Adoption of IEEE 802.11az/bk

arXiv:2603.18687v1 Announce Type: new Abstract: Ranging and localisation have become critical for many applications and services. The Wi-Fi (IEEE 802.11) standard is a natural candidate for providing …

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Beyond TVLA: Anderson-Darling Leakage Assessment for Neural Network Side-Channel Leakage Detection

arXiv:2603.18647v1 Announce Type: new Abstract: Test Vector Leakage Assessment (TVLA) based on Welch's $t$-test has become a standard tool for detecting side-channel leakage. However, its mean-based n…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
MOSAIC: Multi-Objective Slice-Aware Iterative Curation for Alignment

arXiv:2603.18637v1 Announce Type: new Abstract: We study how to allocate a fixed supervised fine-tuning budget when three objectives must be balanced at once: multi-turn safety alignment, low over-ref…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Cyber-Resilient Digital Twins: Discriminating Attacks for Safe Critical Infrastructure Control

arXiv:2603.18613v1 Announce Type: new Abstract: Industrial Cyber-Physical Systems (ICPS) face growing threats from cyber-attacks that exploit sensor and control vulnerabilities. Digital Twin (DT) tech…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
A Complexity Hierarchy of Shuffles in Card-Based Protocols

arXiv:2603.18608v1 Announce Type: new Abstract: Card-based cryptography uses physical playing cards to construct protocols for secure multi-party computation. Existing card-based protocols employ vari…

arXiv Security Read →
◬ AI & Machine Learning Mar 20, 2026
Quantifying Memory Cells Vulnerability for DRAM Security

arXiv:2603.18549v1 Announce Type: new Abstract: Dynamic Random Access Memory (DRAM) is pervasive in computer systems. Cell vulnerabilities caused by unintended phenomena (forced retention failure, lat…

arXiv Security Read →
← Prev 100 / 121 Next →