CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2687 articles  ·  updated every 4 hours · grows forever

2687Total
2646Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 22, 2026
AutomationBench

arXiv:2604.18934v1 Announce Type: new Abstract: Existing AI benchmarks for software automation rarely combine cross-application coordination, autonomous API discovery, and policy adherence. Real busin…

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
Error-free Training for MedMNIST Datasets

arXiv:2604.18916v1 Announce Type: new Abstract: In this paper, we introduce a new concept called Artificial Special Intelligence by which Machine Learning models for the classification problem can be …

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
Formally Verified Patent Analysis via Dependent Type Theory: Machine-Checkable Certificates from a Hybrid AI + Lean 4 Pipeline

arXiv:2604.18882v1 Announce Type: new Abstract: We present a formally verified framework for patent analysis as a hybrid AI + Lean 4 pipeline. The DAG-coverage core (Algorithm 1b) is fully machine-ver…

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
How Adversarial Environments Mislead Agentic AI?

arXiv:2604.18874v1 Announce Type: new Abstract: Tool-integrated agents are deployed on the premise that external tools ground their outputs in reality. Yet this very reliance creates a critical attack…

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
From Natural Language to Executable Narsese: A Neuro-Symbolic Benchmark and Pipeline for Reasoning with NARS

arXiv:2604.18873v1 Announce Type: new Abstract: Large language models (LLMs) are highly capable at language generation, but they remain unreliable when reasoning requires explicit symbolic structure, …

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
Human-Guided Harm Recovery for Computer Use Agents

arXiv:2604.18847v1 Announce Type: new Abstract: As LM agents gain the ability to execute actions on real computer systems, we need ways to not only prevent harmful actions at scale but also effectivel…

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
Quantum inspired qubit qutrit neural networks for real time financial forecasting

arXiv:2604.18838v1 Announce Type: new Abstract: This research investigates the performance and efficacy of machine learning models in stock prediction, comparing Artificial Neural Networks (ANNs), Qua…

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
AI scientists produce results without reasoning scientifically

arXiv:2604.18805v1 Announce Type: new Abstract: Large language model (LLM)-based systems are increasingly deployed to conduct scientific research autonomously, yet whether their reasoning adheres to t…

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
ARES: Adaptive Red-Teaming and End-to-End Repair of Policy-Reward System

arXiv:2604.18789v1 Announce Type: new Abstract: Reinforcement Learning from Human Feedback (RLHF) is central to aligning Large Language Models (LLMs), yet it introduces a critical vulnerability: an im…

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
Beyond One Output: Visualizing and Comparing Distributions of Language Model Generations

arXiv:2604.18724v1 Announce Type: new Abstract: Users typically interact with and evaluate language models via single outputs, but each output is just one sample from a broad distribution of possible …

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
On Solving the Multiple Variable Gapped Longest Common Subsequence Problem

arXiv:2604.18645v1 Announce Type: new Abstract: This paper addresses the Variable Gapped Longest Common Subsequence (VGLCS) problem, a generalization of the classical LCS problem involving flexible ga…

arXiv AI Read →
◬ AI & Machine Learning Apr 22, 2026
"We are currently clean on OPSEC": Why JD Can't Encrypt

arXiv:2604.19711v1 Announce Type: new Abstract: We analyse the 2025 Signalgate leak of sensitive US military information by the Trump administration, addressing why confidentiality was violated (messa…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
An AI Agent Execution Environment to Safeguard User Data

arXiv:2604.19657v1 Announce Type: new Abstract: AI agents promise to serve as general-purpose personal assistants for their users, which requires them to have access to private user data (e.g., person…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
Adding Compilation Metadata To Binaries To Make Disassembly Decidable

arXiv:2604.19628v1 Announce Type: new Abstract: The binary executable format is the standard method for distributing and executing software. Yet, it is also as opaque a representation of software as c…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
Cyber Defense Benchmark: Agentic Threat Hunting Evaluation for LLMs in SecOps

arXiv:2604.19533v1 Announce Type: new Abstract: We introduce the Cyber Defense Benchmark, a benchmark for measuring how well large language model (LLM) agents perform the core SOC analyst task of thre…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
Evaluating LLM-Generated Obfuscated XSS Payloads for Machine Learning-Based Detection

arXiv:2604.19526v1 Announce Type: new Abstract: Cross-site scripting (XSS) remains a persistent web security vulnerability, especially because obfuscation can change the surface form of a malicious pa…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
EvoPatch-IoT: Evolution-Aware Cross-Architecture Vulnerability Retrieval and Patch-State Profiling for BusyBox-Based IoT Firmware

arXiv:2604.19496v1 Announce Type: new Abstract: BusyBox is one of the most widely reused userland components in Linux-based Internet-of-Things (IoT) firmware, yet its security assessment remains diffi…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
API Security Based on Automatic OpenAPI Mapping

arXiv:2604.19471v1 Announce Type: new Abstract: This paper presents Map Reduce Graph (MRG), a novel unsupervised method for modeling and securing HTTP REST APIs. MRG learns API structure from real-wor…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
Involuntary In-Context Learning: Exploiting Few-Shot Pattern Completion to Bypass Safety Alignment in GPT-5.4

arXiv:2604.19461v1 Announce Type: new Abstract: Safety alignment in large language models relies on behavioral training that can be overridden when sufficiently strong in-context patterns compete with…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
Malicious ML Model Detection by Learning Dynamic Behaviors

arXiv:2604.19438v1 Announce Type: new Abstract: Pre-trained machine learning models (PTMs) are commonly provided via Model Hubs (e.g., Hugging Face) in standard formats like Pickles to facilitate acce…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
Secure Storage and Privacy-Preserving Scanpath Comparison via Garbled Circuits in Eye Tracking

arXiv:2604.19422v1 Announce Type: new Abstract: With the growing use of eye tracking on VR and mobile platforms, gaze data is increasing. While scanpath comparison is important to gaze behavior analys…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
Sherpa.ai Privacy-Preserving Multi-Party Entity Alignment without Intersection Disclosure for Noisy Identifiers

arXiv:2604.19219v1 Announce Type: new Abstract: Federated Learning (FL) enables collaborative model training among multiple parties without centralizing raw data. There are two main paradigms in FL: H…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
DP-FlogTinyLLM: Differentially private federated log anomaly detection using Tiny LLMs

arXiv:2604.19118v1 Announce Type: new Abstract: Modern distributed systems generate massive volumes of log data that are critical for detecting anomalies and cyber threats. However, in real world sett…

arXiv Security Read →
◬ AI & Machine Learning Apr 22, 2026
Dual-Guard: Dual-Channel Latent Watermarking for Provenance and Tamper Localization in Diffusion Images

arXiv:2604.19090v1 Announce Type: new Abstract: The rapid adoption of diffusion-based generative models has intensified concerns over the attribution and integrity of AI-generated content (AIGC). Exis…

arXiv Security Read →
← Prev 27 / 112 Next →