arXiv:2602.02689v2 Announce Type: replace Abstract: We propose Eidolon, a post-quantum signature scheme grounded on the NP-complete k-colorability problem. Our construction generalizes the Goldreich-M…
cyberintel.kalymoon.com · 2686 articles · updated every 4 hours · grows forever
arXiv:2602.02689v2 Announce Type: replace Abstract: We propose Eidolon, a post-quantum signature scheme grounded on the NP-complete k-colorability problem. Our construction generalizes the Goldreich-M…
arXiv:2601.03294v2 Announce Type: replace Abstract: LLM-based agents are increasingly deployed to autonomously solve complex tasks, raising urgent needs for IP protection and regulatory provenance. Wh…
arXiv:2512.05707v2 Announce Type: replace Abstract: We evaluate the effectiveness of filtering child images from training datasets of text-to-image models to prevent model misuse to create child sexua…
arXiv:2511.17283v2 Announce Type: replace Abstract: With the rapid growth of IoT, secure and efficient mesh networking has become essential. Thread has emerged as a key protocol, widely used in smart-…
arXiv:2510.21236v3 Announce Type: replace Abstract: Large Language Models (LLMs) have evolved into AI agents that interact with external tools and environments to perform complex tasks. The Model Cont…
arXiv:2507.03014v2 Announce Type: replace Abstract: Large language models (LLMs) face significant copyright and intellectual property challenges as the cost of training increases and model reuse becom…
arXiv:2506.17299v2 Announce Type: replace Abstract: As large language models (LLMs) become increasingly deployed in safety-critical applications, the lack of systematic methods to assess their vulnera…
arXiv:2505.12296v2 Announce Type: replace Abstract: Our evaluation shows that PoLO achieves \textbf{99\%} watermark detection accuracy for ownership verification, while preserving data privacy and cut…
arXiv:2604.22639v1 Announce Type: new Abstract: Malware development and detection have undergone significant changes in recent years as modern concepts, such as machine learning, have been used for bo…
arXiv:2604.22629v1 Announce Type: new Abstract: This work proposes a structural approach to concept drift detection in malware classification using decision tree rulesets. Classifiers are trained acro…
arXiv:2604.22602v1 Announce Type: new Abstract: Blockchain wallets conventionally follow an ownership model where possession of a private key grants unilateral control. However, this assumption is bri…
arXiv:2604.22569v1 Announce Type: new Abstract: Machine learning-based malware detectors are increasingly vulnerable to adversarial examples. Traditional defenses, such as one-shot adversarial trainin…
arXiv:2604.22550v1 Announce Type: new Abstract: Self-supervised learning (SSL) encoders are invaluable intellectual property (IP). However, no existing SSL watermarking for IP protection can concurren…
arXiv:2604.22505v1 Announce Type: new Abstract: Private Information Retrieval (PIR) allows clients to retrieve database entries without leaking retrieval indices, yet malicious servers seriously compr…
arXiv:2604.22438v1 Announce Type: new Abstract: Watermarking has emerged as a promising technique for tracing the authorship of content generated by large language models (LLMs). Among existing approa…
arXiv:2604.22429v1 Announce Type: new Abstract: Scalar multiplication kP is the operation most frequently targeted in Elliptic Curve (EC) cryptosystems. To protect against single-trace Side-Channel An…
arXiv:2604.22427v1 Announce Type: new Abstract: The offensive security landscape is highly fragmented: enterprise platforms avoid memory-corruption vulnerabilities due to Denial of Service (DoS) risks…
arXiv:2604.22307v1 Announce Type: new Abstract: A growing number of Internet of Things (IoT) devices are used across consumer, medical, and industrial domains. They interact with their environment thr…
arXiv:2604.22304v1 Announce Type: new Abstract: This paper proposes a resource-aware allocation model for layered intrusion detection in het erogeneous networks. Monitoring traffic at higher protocol …
arXiv:2604.22291v1 Announce Type: new Abstract: The widespread availability of large-scale code datasets has accelerated the development of code large language models (CodeLLMs), raising concerns abou…
arXiv:2604.22191v1 Announce Type: new Abstract: In agentic workflows, LLMs frequently process retrieved contexts that are legally protected from further training. However, auditors currently lack a re…
arXiv:2604.22176v1 Announce Type: new Abstract: Accurate mapping between Common Vulnerabilities and Exposures (CVE) and Common Weakness Enumeration (CWE) entries is critical for effective vulnerabilit…
arXiv:2604.22157v1 Announce Type: new Abstract: Existing research typically treats privacy policies as flat, uniform text, extracting information without regard for the document's logical hierarchy. D…
arXiv:2604.22136v1 Announce Type: new Abstract: Large language model (LLM) agents increasingly issue API calls that mutate real systems, yet many current architectures pass stochastic model outputs di…