CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2927 articles  ·  updated every 4 hours · grows forever

2927Total
2882Full Text
May 21, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning
Technical Case Study of Privacy-Enhancing Technologies (PETs) for Public Health

arXiv:2603.13444v1 Announce Type: new Abstract: We present a technical case study on the Privacy-Enhancing Technologies (PETs) for Public Health Challenge, a collaborative effort to safely leverage se…

arXiv Security Read →
◬ AI & Machine Learning
Purifying Generative LLMs from Backdoors without Prior Knowledge or Clean Reference

arXiv:2603.13461v1 Announce Type: new Abstract: Backdoor attacks pose severe security threats to large language models (LLMs), where a model behaves normally under benign inputs but produces malicious…

arXiv Security Read →
◬ AI & Machine Learning
An Ideal Random Number Generator Based on Quantum Fluctuations and Rotating Wheel for Secure Image Encryption

arXiv:2603.13472v1 Announce Type: new Abstract: In the era of digitization secure transmission of digital images has become essential in real world applications. Image encryption is an effective techn…

arXiv Security Read →
◬ AI & Machine Learning
CTI-REALM: Benchmark to Evaluate Agent Performance on Security Detection Rule Generation Capabilities

arXiv:2603.13517v1 Announce Type: new Abstract: CTI-REALM (Cyber Threat Real World Evaluation and LLM Benchmarking) is a benchmark designed to evaluate AI agents' ability to interpret cyber threat int…

arXiv Security Read →
◬ AI & Machine Learning
SecDTD: Dynamic Token Drop for Secure Transformers Inference

arXiv:2603.13670v1 Announce Type: new Abstract: The rapid adoption of Transformer-based AI has been driven by accessible models such as ChatGPT, which provide API-based services for developers and bus…

arXiv Security Read →
◬ AI & Machine Learning
Hidden Risks of Unmonitored GPUs in Intelligent Transportation Systems

arXiv:2603.13675v1 Announce Type: new Abstract: Graphics processing units (GPUs) power many intelligent transportation systems (ITS) and automated driving applications, but remain largely unmonitored …

arXiv Security Read →
◬ AI & Machine Learning
Graph Neural Network-Based DDoS Protection for Data Center Infrastructure

arXiv:2603.13694v1 Announce Type: new Abstract: In light of rising cybersecurity threats, data center providers face growing pressure to protect their own management infrastructure from Distributed De…

arXiv Security Read →
◬ AI & Machine Learning
REAEDP: Entropy-Calibrated Differentially Private Data Release with Formal Guarantees and Attack-Based Evaluation

arXiv:2603.13709v1 Announce Type: new Abstract: Sensitive data release is vulnerable to output-side privacy threats such as membership inference, attribute inference, and record linkage. This creates …

arXiv Security Read →
◬ AI & Machine Learning
TableMark: A Multi-bit Watermark for Synthetic Tabular Data

arXiv:2603.13722v1 Announce Type: new Abstract: Watermarking has emerged as an effective solution for copyright protection of synthetic data. However, applying watermarking techniques to synthetic tab…

arXiv Security Read →
◬ AI & Machine Learning
Ransomware and Artificial Intelligence: A Comprehensive Systematic Review of Reviews

arXiv:2603.13734v1 Announce Type: new Abstract: This study provides a comprehensive synthesis of Artificial Intelligence (AI), especially Machine Learning (ML) and Deep Learning (DL), in ransomware de…

arXiv Security Read →
◬ AI & Machine Learning
Unlinkability and History Preserving Bisimilarity

arXiv:2603.13735v1 Announce Type: new Abstract: An ever-increasing number of critical infrastructures rely heavily on the assumption that security protocols satisfy a wealth of requirements. Hence, th…

arXiv Security Read →
◬ AI & Machine Learning
Switching Coordinator: An SDN Application for Flexible QKD-Networks

arXiv:2603.13812v1 Announce Type: new Abstract: A monitor and control framework for quantum-key-distribution (QKD) networks equipped with switching capabilities was developed. On the one hand, this fr…

arXiv Security Read →
◬ AI & Machine Learning
Sirens' Whisper: Inaudible Near-Ultrasonic Jailbreaks of Speech-Driven LLMs

arXiv:2603.13847v1 Announce Type: new Abstract: Speech-driven large language models (LLMs) are increasingly accessed through speech interfaces, introducing new security risks via open acoustic channel…

arXiv Security Read →
◬ AI & Machine Learning
Inevitable Encounters: Backdoor Attacks Involving Lossy Compression

arXiv:2603.13864v1 Announce Type: new Abstract: Real-world backdoor attacks often require poisoned datasets to be stored and transmitted before being used to compromise deep learning systems. However,…

arXiv Security Read →
◬ AI & Machine Learning
CONFETTY: A Tool for Enforcement and Data Confidentiality on Blockchain-Based Processes

arXiv:2603.13900v1 Announce Type: new Abstract: Blockchain technology enforces the security, robustness, and traceability of operations of Process-Aware Information Systems (PAISs). In particular, tra…

arXiv Security Read →
◬ AI & Machine Learning
On secret sharing from extended norm-trace curves

arXiv:2603.14009v1 Announce Type: new Abstract: In [4] Camps-Moreno et al. treated (relative) generalized Hamming weights of codes from extended norm-trace curves and they gave examples of resulting g…

arXiv Security Read →
◬ AI & Machine Learning
Sovereign-OS: A Charter-Governed Operating System for Autonomous AI Agents with Verifiable Fiscal Discipline

arXiv:2603.14011v1 Announce Type: new Abstract: As AI agents evolve from text generators into autonomous economic actors that accept jobs, manage budgets, and delegate to sub-agents, the absence of ru…

arXiv Security Read →
◬ AI & Machine Learning
Missing Mass for Differentially Private Domain Discovery

arXiv:2603.14016v1 Announce Type: new Abstract: We study several problems in differentially private domain discovery, where each user holds a subset of items from a shared but unknown domain, and the …

arXiv Security Read →
◬ AI & Machine Learning
Towards Agentic Honeynet Configuration

arXiv:2603.14122v1 Announce Type: new Abstract: Honeypots are deception systems that emulate vulnerable services to collect threat intelligence. While deploying many honeypots increases the opportunit…

arXiv Security Read →
◬ AI & Machine Learning
Experimental Evaluation of Security Attacks on Self-Driving Car Platforms

arXiv:2603.14124v1 Announce Type: new Abstract: Deep learning-based perception pipelines in autonomous ground vehicles are vulnerable to both adversarial manipulation and network-layer disruption. We …

arXiv Security Read →
◬ AI & Machine Learning
Membership Inference for Contrastive Pre-training Models with Text-only PII Queries

arXiv:2603.14222v1 Announce Type: new Abstract: Contrastive pretraining models such as CLIP and CLAP underpin many vision-language and audio-language systems, yet their reliance on web-scale data rais…

arXiv Security Read →
◬ AI & Machine Learning
Activation Surgery: Jailbreaking White-box LLMs without Touching the Prompt

arXiv:2603.14278v1 Announce Type: new Abstract: Most jailbreak techniques for Large Language Models (LLMs) primarily rely on prompt modifications, including paraphrasing, obfuscation, or conversationa…

arXiv Security Read →
◬ AI & Machine Learning
AEX: Non-Intrusive Multi-Hop Attestation and Provenance for LLM APIs

arXiv:2603.14283v1 Announce Type: new Abstract: Hosted large language models are increasingly accessed through remote APIs, but the API boundary still offers little direct evidence that a returned out…

arXiv Security Read →
◬ AI & Machine Learning
Governing Dynamic Capabilities: Cryptographic Binding and Reproducibility Verification for AI Agent Tool Use

arXiv:2603.14332v1 Announce Type: new Abstract: AI agents dynamically acquire capabilities at runtime via MCP and A2A, yet no framework detects when capabilities change post-authorization. We term thi…

arXiv Security Read →
← Prev 117 / 122 Next →