arXiv:2604.10501v1 Announce Type: new Abstract: Recent advances in research on Attribute-based Access Control (ABAC) has led to the development of several ingenious methods for representing and enforc…
cyberintel.kalymoon.com · 2689 articles · updated every 4 hours · grows forever
arXiv:2604.10501v1 Announce Type: new Abstract: Recent advances in research on Attribute-based Access Control (ABAC) has led to the development of several ingenious methods for representing and enforc…
arXiv:2604.10479v1 Announce Type: new Abstract: We give a public key encryption scheme with plausible quasi-exponential security based on the conjectured intractability of two constraint satisfaction …
arXiv:2604.10473v1 Announce Type: new Abstract: As artificial intelligence (AI) systems grow more powerful, autonomous, and embedded in critical infrastructure, their identification and traceability b…
arXiv:2604.10427v1 Announce Type: new Abstract: We develop a queueing-theoretic framework to model the temporal evolution of cyber-attack surfaces, where the number of active vulnerabilities is repres…
arXiv:2604.10380v1 Announce Type: new Abstract: Electronic cash (e-cash) is a digital alternative to physical currency that allows anonymous transactions between users and merchants. Typically, coins …
arXiv:2604.10326v1 Announce Type: new Abstract: Large language models remain vulnerable to jailbreak attacks -- inputs designed to bypass safety mechanisms and elicit harmful responses -- despite adva…
arXiv:2604.10271v1 Announce Type: new Abstract: In what way could a data breach involving government-issued IDs such as passports, driver's licenses, etc., rival a random voluntary disclosure on a non…
arXiv:2604.10250v1 Announce Type: new Abstract: We provide an approach that closely estimates an organization's cyber resources directly from vulnerability timestamps, using a non-stationary queueing …
arXiv:2604.10175v1 Announce Type: new Abstract: Toxicity and harassment are widespread in the video-gaming context. Especially in competitive online multiplayer scenarios, gamers oftentimes send harmf…
arXiv:2604.10145v1 Announce Type: new Abstract: Client-side privacy rewriting is crucial for deploying LLMs in privacy-sensitive domains. However, existing approaches struggle to balance privacy and u…
arXiv:2604.10138v1 Announce Type: new Abstract: Apple AirTags use Apple's Find My network: when nearby iDevices detect a lost tag, they anonymously forward an encrypted location report to Apple, which…
arXiv:2604.10134v1 Announce Type: new Abstract: Large Language Model (LLM) agents are increasingly integrated into critical systems, leveraging external tools to interact with the real world. However,…
arXiv:2604.10052v1 Announce Type: new Abstract: The rapid development and integration of intelligent technologies in the Internet of Vehicles (IoV) have revolutionized transportation systems by enhanc…
arXiv:2604.09998v1 Announce Type: new Abstract: Large language models (LLMs) have recently emerged as promising tools for augmenting Security Operations Center (SOC) workflows, with vendors increasing…
arXiv:2604.09975v1 Announce Type: new Abstract: Transformer inference in machine-learning-as-a-service (MLaaS) raises privacy concerns for sensitive user inputs. Prior secure solutions that combine fu…
arXiv:2604.09924v1 Announce Type: new Abstract: We design and develop a secret-sharing-scheme-based cyberattack detection model(S3CDM)that can detect unauthorized or illegal activities (especially ins…
arXiv:2604.09849v1 Announce Type: new Abstract: We study whether in-domain pretraining of Bidirectional Encoder Representations from Transformer (BERT) model improves subdomain-level detection of exfi…
arXiv:2604.09750v1 Announce Type: new Abstract: Large Reasoning Models (LRMs) have achieved remarkable performance across diverse domains, yet their decision-making under conflicting objectives remain…
arXiv:2604.09748v1 Announce Type: new Abstract: Reinforcement Learning with Verifiable Rewards (RLVR) is an emerging paradigm that significantly boosts a Large Language Model's (LLM's) reasoning abili…
arXiv:2604.09747v1 Announce Type: new Abstract: Large Language Model (LLM) agents have achieved rapid adoption and demonstrated remarkable capabilities across a wide range of applications. To improve …
The TL;DR is that Google engineering appears to have the same AI adoption footprint as John Deere, the tractor company. Most of the industry has the same internal adoption curve: 20% agentic power use…
If you’re following AI news, you’re probably getting whiplash. AI is a gold rush. AI is a bubble. AI is taking your job. AI can’t even read a clock. The 2026 AI Index from Stanford University’s Instit…
This story originally appeared in The Algorithm, our weekly newsletter on AI. To get stories like this in your inbox first, sign up here. In an industry that doesn’t stand still, Stanford’s AI Index, …
AI Security & Exposure Survey 2026: What CISOs Say They’re Missing LinkedIn