CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2686 articles  ·  updated every 4 hours · grows forever

2686Total
2643Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 27, 2026
Eidolon: A Post-Quantum Signature Scheme Based on k-Colorability in the Age of Graph Neural Networks

arXiv:2602.02689v2 Announce Type: replace Abstract: We propose Eidolon, a post-quantum signature scheme grounded on the NP-complete k-colorability problem. Our construction generalizes the Goldreich-M…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
AgentMark: Utility-Preserving Behavioral Watermarking for Agents

arXiv:2601.03294v2 Announce Type: replace Abstract: LLM-based agents are increasingly deployed to autonomously solve complex tasks, raising urgent needs for IP protection and regulatory provenance. Wh…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models

arXiv:2512.05707v2 Announce Type: replace Abstract: We evaluate the effectiveness of filtering child images from training datasets of text-to-image models to prevent model misuse to create child sexua…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
ThreadFuzzer: Fuzzing Framework for Thread Protocol

arXiv:2511.17283v2 Announce Type: replace Abstract: With the rapid growth of IoT, secure and efficient mesh networking has become essential. Thread has emerged as a key protocol, widely used in smart-…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
AgentBound: Securing Execution Boundaries of AI Agents

arXiv:2510.21236v3 Announce Type: replace Abstract: Large Language Models (LLMs) have evolved into AI agents that interact with external tools and environments to perform complex tasks. The Model Cont…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Intrinsic Fingerprint of LLMs: Continue Training is NOT All You Need to Steal A Model!

arXiv:2507.03014v2 Announce Type: replace Abstract: Large language models (LLMs) face significant copyright and intellectual property challenges as the cost of training increases and model reuse becom…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Toward Principled LLM Safety Testing: Solving the Jailbreak Oracle Problem

arXiv:2506.17299v2 Announce Type: replace Abstract: As large language models (LLMs) become increasingly deployed in safety-critical applications, the lack of systematic methods to assess their vulnera…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
PoLO: Proof-of-Learning and Proof-of-Ownership at Once with Chained Watermarking

arXiv:2505.12296v2 Announce Type: replace Abstract: Our evaluation shows that PoLO achieves \textbf{99\%} watermark detection accuracy for ownership verification, while preserving data privacy and cut…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Adversarial Malware Generation in Linux ELF Binaries via Semantic-Preserving Transformations

arXiv:2604.22639v1 Announce Type: new Abstract: Malware development and detection have undergone significant changes in recent years as modern concepts, such as machine learning, have been used for bo…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Detecting Concept Drift in Evolving Malware Families Using Rule-Based Classifier Representations

arXiv:2604.22629v1 Announce Type: new Abstract: This work proposes a structural approach to concept drift detection in malware classification using decision tree rulesets. Classifiers are trained acro…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
PASS: A Provenanced Access Subaccount System for Blockchain Wallets

arXiv:2604.22602v1 Announce Type: new Abstract: Blockchain wallets conventionally follow an ownership model where possession of a private key grants unilateral control. However, this assumption is bri…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Adversarial Co-Evolution of Malware and Detection Models: A Bilevel Optimization Perspective

arXiv:2604.22569v1 Announce Type: new Abstract: Machine learning-based malware detectors are increasingly vulnerable to adversarial examples. Traditional defenses, such as one-shot adversarial trainin…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
ArmSSL: Adversarial Robust Black-Box Watermarking for Self-Supervised Learning Pre-trained Encoders

arXiv:2604.22550v1 Announce Type: new Abstract: Self-supervised learning (SSL) encoders are invaluable intellectual property (IP). However, no existing SSL watermarking for IP protection can concurren…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Information-Theoretic Authenticated PIR: From PIR-RV To APIR

arXiv:2604.22505v1 Announce Type: new Abstract: Private Information Retrieval (PIR) allows clients to retrieve database entries without leaking retrieval indices, yet malicious servers seriously compr…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
SSG: Logit-Balanced Vocabulary Partitioning for LLM Watermarking

arXiv:2604.22438v1 Announce Type: new Abstract: Watermarking has emerged as a promising technique for tracing the authorship of content generated by large language models (LLMs). Among existing approa…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Horizontal SCA Attacks on Binary kP Algorithms using Chevallier-Mames Atomic Blocks

arXiv:2604.22429v1 Announce Type: new Abstract: Scalar multiplication kP is the operation most frequently targeted in Elliptic Curve (EC) cryptosystems. To protect against single-trace Side-Channel An…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Automation-Exploit: A Multi-Agent LLM Framework for Adaptive Offensive Security with Digital Twin-Based Risk-Mitigated Exploitation

arXiv:2604.22427v1 Announce Type: new Abstract: The offensive security landscape is highly fragmented: enterprise platforms avoid memory-corruption vulnerabilities due to Denial of Service (DoS) risks…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Introducing the Cyber-Physical Data Flow Diagram to Improve Threat Modelling of Internet of Things Devices

arXiv:2604.22307v1 Announce Type: new Abstract: A growing number of Internet of Things (IoT) devices are used across consumer, medical, and industrial domains. They interact with their environment thr…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Resource-Aware Layered Intrusion Detection Allocation Model

arXiv:2604.22304v1 Announce Type: new Abstract: This paper proposes a resource-aware allocation model for layered intrusion detection in het erogeneous networks. Monitoring traffic at higher protocol …

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Train in Vain: Functionality-Preserving Poisoning to Prevent Unauthorized Use of Code Datasets

arXiv:2604.22291v1 Announce Type: new Abstract: The widespread availability of large-scale code datasets has accelerated the development of code large language models (CodeLLMs), raising concerns abou…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Behavioral Canaries: Auditing Private Retrieved Context Usage in RL Fine-Tuning

arXiv:2604.22191v1 Announce Type: new Abstract: In agentic workflows, LLMs frequently process retrieved contexts that are legally protected from further training. However, auditors currently lack a re…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
FixV2W: Correcting Invalid CVE-CWE Mappings with Knowledge Graph Embeddings

arXiv:2604.22176v1 Announce Type: new Abstract: Accurate mapping between Common Vulnerabilities and Exposures (CVE) and Common Weakness Enumeration (CWE) entries is critical for effective vulnerabilit…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
PrivSTRUCT: Untangling Data Purpose Compliance of Privacy Policies in Google Play Store

arXiv:2604.22157v1 Announce Type: new Abstract: Existing research typically treats privacy policies as flat, uniform text, extracting information without regard for the document's logical hierarchy. D…

arXiv Security Read →
◬ AI & Machine Learning Apr 27, 2026
Sovereign Agentic Loops: Decoupling AI Reasoning from Execution in Real-World Systems

arXiv:2604.22136v1 Announce Type: new Abstract: Large language model (LLM) agents increasingly issue API calls that mutate real systems, yet many current architectures pass stochastic model outputs di…

arXiv Security Read →
← Prev 18 / 112 Next →