CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2713 articles  ·  updated every 4 hours · grows forever

2713Total
2672Full Text
May 18, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 10, 2026
ACIArena: Toward Unified Evaluation for Agent Cascading Injection

arXiv:2604.07775v1 Announce Type: cross Abstract: Collaboration and information sharing empower Multi-Agent Systems (MAS) but also introduce a critical security risk known as Agent Cascading Injection…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
SAFE: Spatially-Aware Feedback Enhancement for Fault-Tolerant Trust Management in VANETs

arXiv:2604.07552v1 Announce Type: cross Abstract: Trust management in VANETs is critically important for secure communication between vehicles. In event-based trust systems, vehicles broadcast the eve…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Vulnerability Abundance: A formal proof of infinite vulnerabilities in code

arXiv:2604.07539v1 Announce Type: cross Abstract: We present a constructive proof that a single C program, the \emph{Vulnerability Factory}, admits a countably infinite set of distinct, independently …

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
IPEK: Intelligent Priority-Aware Event-Based Trust with Asymmetric Knowledge for Resilient Vehicular Ad-Hoc Networks

arXiv:2604.07532v1 Announce Type: cross Abstract: Vehicular Ad Hoc Networks (VANETs) are vulnerable to intelligent attackers who exploit the homogeneous treatment of traffic events in existing trust m…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
PIArena: A Platform for Prompt Injection Evaluation

arXiv:2604.08499v1 Announce Type: new Abstract: Prompt injection attacks pose serious security risks across a wide range of real-world applications. While receiving increasing attention, the community…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Post-Quantum Cryptographic Analysis of Message Transformations Across the Network Stack

arXiv:2604.08480v1 Announce Type: new Abstract: When a user sends a message over a wireless network, the message does not travel as-is. It is encrypted, authenticated, encapsulated, and transformed as…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Your Agent Is Mine: Measuring Malicious Intermediary Attacks on the LLM Supply Chain

arXiv:2604.08407v1 Announce Type: new Abstract: Large language model (LLM) agents increasingly rely on third-party API routers to dispatch tool-calling requests across multiple upstream providers. The…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Securing Retrieval-Augmented Generation: A Taxonomy of Attacks, Defenses, and Future Directions

arXiv:2604.08304v1 Announce Type: new Abstract: Retrieval-augmented generation (RAG) significantly enhances large language models (LLMs) but introduces novel security risks through external knowledge …

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Towards Identification and Intervention of Safety-Critical Parameters in Large Language Models

arXiv:2604.08297v1 Announce Type: new Abstract: Ensuring Large Language Model (LLM) safety is crucial, yet the lack of a clear understanding about safety mechanisms hinders the development of precise …

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Multimodal Reasoning with LLM for Encrypted Traffic Interpretation: A Benchmark

arXiv:2604.08140v1 Announce Type: new Abstract: Network traffic, as a key media format, is crucial for ensuring security and communications in modern internet infrastructure. While existing methods of…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
TADP-RME: A Trust-Adaptive Differential Privacy Framework for Enhancing Reliability of Data-Driven Systems

arXiv:2604.08113v1 Announce Type: new Abstract: Ensuring reliability in adversarial settings necessitates treating privacy as a foundational component of data-driven systems. While differential privac…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
PrivFedTalk: Privacy-Aware Federated Diffusion with Identity-Stable Adapters for Personalized Talking-Head Generation

arXiv:2604.08037v1 Announce Type: new Abstract: Talking-head generation has advanced rapidly with diffusion-based generative models, but training usually depends on centralized face-video and speech d…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
xDup: Privacy-Preserving Deduplication for Humanitarian Organizations using Fuzzy PSI

arXiv:2604.08019v1 Announce Type: new Abstract: Humanitarian organizations help to ensure people's livelihoods in crisis situations. Typically, multiple organizations operate in the same region. To en…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
A Hardware-Anchored Privacy Middleware for PII Sharing Across Heterogeneous Embedded Consumer Devices

arXiv:2604.07839v1 Announce Type: new Abstract: The rapid expansion of the Internet of Things (IoT) and smart home ecosystems has led to a fragmented landscape of user data management across consumer …

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Are GUI Agents Focused Enough? Automated Distraction via Semantic-level UI Element Injection

arXiv:2604.07831v1 Announce Type: new Abstract: Existing red-teaming studies on GUI agents have important limitations. Adversarial perturbations typically require white-box access, which is unavailabl…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
BRASP: Boolean Range Queries over Encrypted Spatial Data with Access and Search Pattern Privacy

arXiv:2604.07797v1 Announce Type: new Abstract: Searchable Encryption (SE) enables users to query outsourced encrypted data while preserving data confidentiality. However, most efficient schemes still…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Anamorphic Encryption with CCA Security: A Standard Model Construction

arXiv:2604.07771v1 Announce Type: new Abstract: Anamorphic encryption serves as a vital tool for covert communication, maintaining secrecy even during post-compromise scenarios. Particularly in the re…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
The Art of (Mis)alignment: How Fine-Tuning Methods Effectively Misalign and Realign LLMs in Post-Training

arXiv:2604.07754v1 Announce Type: new Abstract: The deployment of large language models (LLMs) raises significant ethical and safety concerns. While LLM alignment techniques are adopted to improve mod…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
TrajGuard: Streaming Hidden-state Trajectory Detection for Decoding-time Jailbreak Defense

arXiv:2604.07727v1 Announce Type: new Abstract: Existing jailbreak defense paradigms primarily rely on static detection of prompts, outputs, or internal states, often neglecting the dynamic evolution …

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
AITH: A Post-Quantum Continuous Delegation Protocol for Human-AI Trust Establishment

arXiv:2604.07695v1 Announce Type: new Abstract: The rapid deployment of AI agents acting autonomously on behalf of human principals has outpaced the development of cryptographic protocols for establis…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
Interpreting the Error of Differentially Private Median Queries through Randomization Intervals

arXiv:2604.07581v1 Announce Type: new Abstract: It can be difficult for practitioners to interpret the quality of differentially private (DP) statistics due to the added noise. One method to help anal…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
MEV-ACE: Identity-Authenticated Fair Ordering for Proposer-Controlled MEV Mitigation

arXiv:2604.07568v1 Announce Type: new Abstract: Maximal Extractable Value, or MEV, remains a structural threat to blockchain fairness because a block producer can often observe pending transactions an…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
MCP-DPT: A Defense-Placement Taxonomy and Coverage Analysis for Model Context Protocol Security

arXiv:2604.07551v1 Announce Type: new Abstract: The Model Context Protocol (MCP) enables large language models (LLMs) to dynamically discover and invoke third-party tools, significantly expanding agen…

arXiv Security Read →
◬ AI & Machine Learning Apr 10, 2026
TRUSTDESC: Preventing Tool Poisoning in LLM Applications via Trusted Description Generation

arXiv:2604.07536v1 Announce Type: new Abstract: Large language models (LLMs) increasingly rely on external tools to perform time-sensitive tasks and real-world actions. While tool integration expands …

arXiv Security Read →
← Prev 50 / 114 Next →