CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2686 articles  ·  updated every 4 hours · grows forever

2686Total
2643Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 29, 2026
A Tree-Based Repository Blockchain Framework for Shared Governance in Collaborative Fork Ecosystems

arXiv:2604.25015v1 Announce Type: cross Abstract: Collaborative blockchain ecosystems allow diverse groups to cooperate on tasks while providing properties such as decentralization and transaction sec…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Prime-Field PINI: Machine-Checked Composition Theorems for Post-Quantum NTT Masking

arXiv:2604.25878v1 Announce Type: new Abstract: This is Paper 6 of a series of formally-verified analyses of masked NTT hardware for post-quantum cryptography; Paper 1 [1] established structural depen…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Towards Agentic Investigation of Security Alerts

arXiv:2604.25846v1 Announce Type: new Abstract: Security analysts are overwhelmed by the volume of alerts and the low context provided by many detection systems. Early-stage investigations typically r…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Threat-Oriented Digital Twinning for Security Evaluation of Autonomous Platforms

arXiv:2604.25757v1 Announce Type: new Abstract: Open, unclassified research on secure autonomy is constrained by limited access to operational platforms, contested communications infrastructure, and r…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
The Surprising Universality of LLM Outputs: A Real-Time Verification Primitive

arXiv:2604.25634v1 Announce Type: new Abstract: We report a striking statistical regularity in frontier LLM outputs that enables a CPU-only scoring primitive running at 2.6 microseconds per token, wit…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
SnapGuard: Lightweight Prompt Injection Detection for Screenshot-Based Web Agents

arXiv:2604.25562v1 Announce Type: new Abstract: Web agents have emerged as an effective paradigm for automating interactions with complex web environments, yet remain vulnerable to prompt injection at…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
From CRUD to Autonomous Agents: Formal Validation and Zero-Trust Security for Semantic Gateways in AI-Native Enterprise Systems

arXiv:2604.25555v1 Announce Type: new Abstract: Enterprise software engineering is shifting away from deterministic CRUD/REST architectures toward AI-native systems where large language models act as …

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Medoid Prototype Alignment for Cross-Plant Unknown Attack Detection in Industrial Control Systems

arXiv:2604.25544v1 Announce Type: new Abstract: Deploying an intrusion detector trained in one industrial plant to another remains difficult because Industrial Control System (ICS) traffic is highly s…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
ReTokSync: Self-Synchronizing Tokenization Disambiguation for Generative Linguistic Steganography

arXiv:2604.25486v1 Announce Type: new Abstract: Generative linguistic steganography (GLS) enables covert communication by embedding secret messages into the natural language generation process. In pra…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
MARD: A Multi-Agent Framework for Robust Android Malware Detection

arXiv:2604.25264v1 Announce Type: new Abstract: With the rapid evolution of Android applications, traditional machine learning-based detection models suffer from concept drift. Additionally, they are …

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
R-CoT: A Reasoning-Layer Watermark via Redundant Chain-of-Thought in Large Language Models

arXiv:2604.25247v1 Announce Type: new Abstract: Large language models (LLMs) are widely deployed in multiple scenarios due to reasoning capabilities. In order to prevent the models from being misused,…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Making AI-Assisted Grant Evaluation Auditable without Exposing the Model

arXiv:2604.25200v1 Announce Type: new Abstract: Public agencies are beginning to consider large language models (LLMs) as decision-support tools for grant evaluation. This creates a practical governan…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Secure Conformance Checking using Token-based Replay and Homomorphic Encryption

arXiv:2604.25190v1 Announce Type: new Abstract: Conformance checking, one of the main process mining operations, aims to identify discrepancies between a process model and an event log. The model repr…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
AgentDID: Trustless Identity Authentication for AI Agents

arXiv:2604.25189v1 Announce Type: new Abstract: AI agents are autonomous entities that can be instantiated on demand, migrate across platforms, and interact with other agents or services without conti…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
MGTEVAL: An Interactive Platform for Systemtic Evaluation of Machine-Generated Text Detectors

arXiv:2604.25152v1 Announce Type: new Abstract: We present MGTEVAL, an extensible platform for systematic evaluation of Machine-Generated Text (MGT) detectors. Despite rapid progress in MGT detection,…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Structured Security Auditing and Robustness Enhancement for Untrusted Agent Skills

arXiv:2604.25109v1 Announce Type: new Abstract: Agent Skills package SKILL.md files, scripts, reference documents, and repository context into reusable capability units, turning pre-load auditing from…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Scalable Secure Biometric Authentication without Auxiliary Identifiers

arXiv:2604.25071v1 Announce Type: new Abstract: The prevalence of biometric authentication has been on the rise due to its ease of use and elimination of weak passwords. To date, most biometric authen…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Extended Abstract: Shaperd: Easily Adoptable Real-Time Traffic Shaper for Fully Encrypted Protocols

arXiv:2604.25069v1 Announce Type: new Abstract: Fully encrypted protocol-based tools (FEPs) are tools commonly used to circumvent censorship in restrictive regions, valued for their performance and se…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Poisoning Learned Index Structures: Static and Dynamic Adversarial Attacks on ALEX

arXiv:2604.24975v1 Announce Type: new Abstract: Learned index structures achieve high performance by modeling the cumulative distribution function (CDF) of keys, but this reliance on data distribution…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
CAN-QA: A Question-Answering Benchmark for Reasoning over In-Vehicle CAN Traffic

arXiv:2604.24935v1 Announce Type: new Abstract: The Controller Area Network (CAN) is a safety-critical in-vehicle communication protocol that lacks built-in security mechanisms, making intrusion detec…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
SUDP: Secret-Use Delegation Protocol for Agentic Systems

arXiv:2604.24920v1 Announce Type: new Abstract: Agentic systems increasingly act with user secrets for APIs, messaging platforms, and cloud services. Today's bearer-secret interfaces implement authori…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Verifying Provenance of Digital Media: Why the C2PA Specifications Fall Short

arXiv:2604.24890v1 Announce Type: new Abstract: The rapid rise of generative AI has made it easy to create convincing fake media at scale. In response, an industrial coalition has developed the Coalit…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
Network Impact of Post-Quantum Certificate Chain sizes on Time to First Byte in TLS Deployments

arXiv:2604.24869v1 Announce Type: new Abstract: Post-Quantum Cryptography (PQC) is a rapidly growing deployment challenge as cryptographically relevant quantum computers (CRQC) continue to advance, le…

arXiv Security Read →
◬ AI & Machine Learning Apr 29, 2026
A Comparative Evaluation of AI Agent Security Guardrails

arXiv:2604.24826v1 Announce Type: new Abstract: This report presents a comparative evaluation of DKnownAI Guard in AI agent security scenarios, benchmarked against three competing products: AWS Bedroc…

arXiv Security Read →
← Prev 15 / 112 Next →