arXiv:2604.06251v1 Announce Type: new Abstract: This article presents the results of a data science study conducted at a container terminal, aimed at reducing unproductive container moves through the …
cyberintel.kalymoon.com · 2750 articles · updated every 4 hours · grows forever
arXiv:2604.06251v1 Announce Type: new Abstract: This article presents the results of a data science study conducted at a container terminal, aimed at reducing unproductive container moves through the …
arXiv:2604.06233v1 Announce Type: new Abstract: Safety-trained language models routinely refuse requests for help circumventing rules. But not all rules deserve compliance. When users ask for help eva…
arXiv:2604.06189v1 Announce Type: new Abstract: Determining the state-space complexity of the game of Shogi (Japanese Chess) has been a challenging problem, with previous combinatorial estimates leavi…
arXiv:2604.06811v1 Announce Type: new Abstract: Skill-based agent systems tackle complex tasks by composing reusable skills, improving modularity and scalability while introducing a largely unexamined…
arXiv:2604.06762v1 Announce Type: new Abstract: Security Information and Event Management (SIEM) systems make it possible for detecting intrusion anomalies in real-time manner by their applied securit…
arXiv:2604.06759v1 Announce Type: new Abstract: The lead marketing ecosystem enables collection, sale, and use of personal data submitted via web forms to deliver personalized quotes in high-value ver…
arXiv:2604.06729v1 Announce Type: new Abstract: In video conferencing, human faces serve as the primary visual focal points, playing multifaceted roles that enhance visual communication and emotional …
arXiv:2604.06712v1 Announce Type: new Abstract: Quantum computing simulators form the classical software foundation on which virtually all quantum algorithm research depends. We present Broken Quantum…
arXiv:2604.06693v1 Announce Type: new Abstract: Recent standards such as RSL address AI content policy declaration -- telling AI systems what the licensing terms are. However, no existing system provi…
arXiv:2604.06638v1 Announce Type: new Abstract: Effective detection of unknown network security threats in multi-class imbalanced environments is critical for maintaining cyberspace security. Current …
arXiv:2604.06633v1 Announce Type: new Abstract: Recent advancements in Large Language Models (LLMs) have sparked interest in their application to Static Application Security Testing (SAST), primarily …
arXiv:2604.06618v1 Announce Type: new Abstract: While recent approaches leverage large language models (LLMs) and multi-agent pipelines to automatically generate proof-of-concept (PoC) exploits from v…
arXiv:2604.06599v1 Announce Type: new Abstract: Concept drift and adversarial evasion are two major challenges for deploying machine learning-based malware detectors. While both have been studied sepa…
arXiv:2604.06550v1 Announce Type: new Abstract: OpenClaw's ClawHub marketplace hosts over 13,000 community-contributed agent skills, and between 13% and 26% of them contain security vulnerabilities ac…
arXiv:2604.06506v1 Announce Type: new Abstract: Symbolic execution detects vulnerabilities with precision, but applying it to large codebases requires harnesses that set up symbolic state, model depen…
arXiv:2604.06436v1 Announce Type: new Abstract: We prove that no continuous, utility-preserving wrapper defense-a function $D: X\to X$ that preprocesses inputs before the model sees them-can make all …
arXiv:2604.06411v1 Announce Type: new Abstract: CubeSats have revolutionized access to space by providing affordable and accessible platforms for research and education. However, their reliance on Com…
arXiv:2604.06409v1 Announce Type: new Abstract: LLM agents increasingly draft messages on behalf of users, yet users routinely overshare sensitive information and disagree on what counts as private. E…
arXiv:2604.06367v1 Announce Type: new Abstract: Web agents automate browser tasks, ranging from simple form completion to complex workflows like ordering groceries. While current benchmarks evaluate g…
arXiv:2604.06323v1 Announce Type: new Abstract: The rapid evolution of intelligent networks under the Internet of Everything (IoE) paradigm is transforming connectivity by integrating people, processe…
arXiv:2604.06297v1 Announce Type: new Abstract: Given the growing reliance on private data in training Large Language Models (LLMs), Federated Learning (FL) combined with Parameter-Efficient Fine-Tuni…
arXiv:2604.06289v1 Announce Type: new Abstract: In this paper, we analyze and improve the adversarial robustness of a convolutional neural network (CNN) that assists crystal-collimator alignment at CE…
arXiv:2604.06285v1 Announce Type: new Abstract: Vision-Language Models (VLMs) have become essential for tasks such as image synthesis, captioning, and retrieval by aligning textual and visual informat…
arXiv:2604.06284v1 Announce Type: new Abstract: Autonomous AI agents powered by Large Language Models can reason, plan, and execute complex tasks, but their ability to autonomously retrieve informatio…