arXiv:2603.13444v1 Announce Type: new Abstract: We present a technical case study on the Privacy-Enhancing Technologies (PETs) for Public Health Challenge, a collaborative effort to safely leverage se…
cyberintel.kalymoon.com · 2927 articles · updated every 4 hours · grows forever
arXiv:2603.13444v1 Announce Type: new Abstract: We present a technical case study on the Privacy-Enhancing Technologies (PETs) for Public Health Challenge, a collaborative effort to safely leverage se…
arXiv:2603.13461v1 Announce Type: new Abstract: Backdoor attacks pose severe security threats to large language models (LLMs), where a model behaves normally under benign inputs but produces malicious…
arXiv:2603.13472v1 Announce Type: new Abstract: In the era of digitization secure transmission of digital images has become essential in real world applications. Image encryption is an effective techn…
arXiv:2603.13517v1 Announce Type: new Abstract: CTI-REALM (Cyber Threat Real World Evaluation and LLM Benchmarking) is a benchmark designed to evaluate AI agents' ability to interpret cyber threat int…
arXiv:2603.13670v1 Announce Type: new Abstract: The rapid adoption of Transformer-based AI has been driven by accessible models such as ChatGPT, which provide API-based services for developers and bus…
arXiv:2603.13675v1 Announce Type: new Abstract: Graphics processing units (GPUs) power many intelligent transportation systems (ITS) and automated driving applications, but remain largely unmonitored …
arXiv:2603.13694v1 Announce Type: new Abstract: In light of rising cybersecurity threats, data center providers face growing pressure to protect their own management infrastructure from Distributed De…
arXiv:2603.13709v1 Announce Type: new Abstract: Sensitive data release is vulnerable to output-side privacy threats such as membership inference, attribute inference, and record linkage. This creates …
arXiv:2603.13722v1 Announce Type: new Abstract: Watermarking has emerged as an effective solution for copyright protection of synthetic data. However, applying watermarking techniques to synthetic tab…
arXiv:2603.13734v1 Announce Type: new Abstract: This study provides a comprehensive synthesis of Artificial Intelligence (AI), especially Machine Learning (ML) and Deep Learning (DL), in ransomware de…
arXiv:2603.13735v1 Announce Type: new Abstract: An ever-increasing number of critical infrastructures rely heavily on the assumption that security protocols satisfy a wealth of requirements. Hence, th…
arXiv:2603.13812v1 Announce Type: new Abstract: A monitor and control framework for quantum-key-distribution (QKD) networks equipped with switching capabilities was developed. On the one hand, this fr…
arXiv:2603.13847v1 Announce Type: new Abstract: Speech-driven large language models (LLMs) are increasingly accessed through speech interfaces, introducing new security risks via open acoustic channel…
arXiv:2603.13864v1 Announce Type: new Abstract: Real-world backdoor attacks often require poisoned datasets to be stored and transmitted before being used to compromise deep learning systems. However,…
arXiv:2603.13900v1 Announce Type: new Abstract: Blockchain technology enforces the security, robustness, and traceability of operations of Process-Aware Information Systems (PAISs). In particular, tra…
arXiv:2603.14009v1 Announce Type: new Abstract: In [4] Camps-Moreno et al. treated (relative) generalized Hamming weights of codes from extended norm-trace curves and they gave examples of resulting g…
arXiv:2603.14011v1 Announce Type: new Abstract: As AI agents evolve from text generators into autonomous economic actors that accept jobs, manage budgets, and delegate to sub-agents, the absence of ru…
arXiv:2603.14016v1 Announce Type: new Abstract: We study several problems in differentially private domain discovery, where each user holds a subset of items from a shared but unknown domain, and the …
arXiv:2603.14122v1 Announce Type: new Abstract: Honeypots are deception systems that emulate vulnerable services to collect threat intelligence. While deploying many honeypots increases the opportunit…
arXiv:2603.14124v1 Announce Type: new Abstract: Deep learning-based perception pipelines in autonomous ground vehicles are vulnerable to both adversarial manipulation and network-layer disruption. We …
arXiv:2603.14222v1 Announce Type: new Abstract: Contrastive pretraining models such as CLIP and CLAP underpin many vision-language and audio-language systems, yet their reliance on web-scale data rais…
arXiv:2603.14278v1 Announce Type: new Abstract: Most jailbreak techniques for Large Language Models (LLMs) primarily rely on prompt modifications, including paraphrasing, obfuscation, or conversationa…
arXiv:2603.14283v1 Announce Type: new Abstract: Hosted large language models are increasingly accessed through remote APIs, but the API boundary still offers little direct evidence that a returned out…
arXiv:2603.14332v1 Announce Type: new Abstract: AI agents dynamically acquire capabilities at runtime via MCP and A2A, yet no framework detects when capabilities change post-authorization. We term thi…