arXiv:2604.13635v1 Announce Type: cross Abstract: In air-ground integrated networks (AGINs), unmanned aerial vehicles (UAVs) provide on-demand edge services to ground vehicles. Realizing this vision r…
cyberintel.kalymoon.com · 2689 articles · updated every 4 hours · grows forever
arXiv:2604.13635v1 Announce Type: cross Abstract: In air-ground integrated networks (AGINs), unmanned aerial vehicles (UAVs) provide on-demand edge services to ground vehicles. Realizing this vision r…
arXiv:2604.13348v1 Announce Type: cross Abstract: We introduce CONCORD, a privacy-aware asynchronous assistant-to-assistant (A2A) framework that leverages collaboration between proactive speech-based …
arXiv:2604.13274v1 Announce Type: cross Abstract: Sequential change-point detection seeks to rapidly identify distributional changes in streaming data while controlling false alarms. Existing multi-st…
arXiv:2604.13153v1 Announce Type: cross Abstract: 3D Gaussian Splatting (3DGS) has recently enabled highly photorealistic 3D reconstruction from casually captured multi-view images. However, this acce…
arXiv:2604.14135v1 Announce Type: new Abstract: We consider the block withholding attacks on pools, more specifically the state-of-the-art Power Adjusting Withholding (PAW) attack. We propose a genera…
arXiv:2604.14038v1 Announce Type: new Abstract: Smart contracts deployed on blockchains such as Ethereum routinely manage large amounts of assets, making their security critical. Empirical studies sho…
arXiv:2604.13955v1 Announce Type: new Abstract: According to constructivist theory, students learn software security more effectively when examples are grounded in their own code. Generic examples oft…
arXiv:2604.13849v1 Announce Type: new Abstract: The rapid proliferation of Model Context Protocol (MCP)-based agentic systems has introduced a new category of security threats that existing frameworks…
arXiv:2604.13764v1 Announce Type: new Abstract: How do security scanners perform on real-world code? We present RealVuln, the first open-source benchmark comparing Rule-Based SAST, General-Purpose LLM…
arXiv:2604.13668v1 Announce Type: new Abstract: European digital sovereignty and security increasingly depends on whether high-impact decisions can be grounded in location evidence that remains credib…
arXiv:2604.13630v1 Announce Type: new Abstract: The performance of large language model (LLM) agents depends critically on the execution harness, the system layer that orchestrates tool use, context m…
arXiv:2604.13474v1 Announce Type: new Abstract: We propose a novel end-to-end privacy-preserving framework, instantiated by three efficient protocols for different deployment scenarios, covering both …
arXiv:2604.13308v1 Announce Type: new Abstract: The United States designates Food and Agriculture as one of sixteen critical infrastructure sectors, yet no mandatory cybersecurity requirements exist f…
arXiv:2604.13301v1 Announce Type: new Abstract: Trusted monitoring, the standard defense in AI control, is vulnerable to adaptive attacks, collusion, and strategic attack selection. All of these explo…
arXiv:2604.13298v1 Announce Type: new Abstract: The globalization of integrated circuit (IC) design and manufacturing has increased the exposure of hardware intellectual property (IP) to untrusted sta…
arXiv:2604.13289v1 Announce Type: new Abstract: Modern stream ciphers rely on strong diffusion and pseudorandom keystream generation (PKG) to resist cryptanalysis. While conventional evaluation method…
arXiv:2604.13122v1 Announce Type: new Abstract: Covert wireless communication aims to establish a reliable link while hiding the transmission from an adversary. In wireless settings, uncertainty plays…
arXiv:2604.13116v1 Announce Type: new Abstract: Covert quantum communication is usually analyzed under idealized assumptions that channel parameters, such as transmissivity and background noise, are p…
Tool: datasette.io news preview The datasette.io website has a news section built from this news.yaml file in the underlying GitHub repository. The YAML format looks like this: - date: 2026-04-15 body…
Release: datasette-export-database 0.3a1 This plugin was using the ds_csrftoken cookie as part of a custom signed URL, which needed upgrading now that Datasette 1.0a27 no longer sets that cookie . Tag…
Release: datasette 1.0a27 Two major changes in this new Datasette alpha. I covered the first of those in detail yesterday - Datasette no longer uses Django-style CSRF form tokens, instead using modern…
Gemini 3.1 Flash TTS is now available across Google products.
The real goldmine isn’t that Apple gets a cut of every App Store transaction. It’s that Apple’s platforms have the best apps, and users who are drawn to the best apps are thus drawn to the iPhone, Mac…