CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2751 articles  ·  updated every 4 hours · grows forever

2751Total
2711Full Text
May 18, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Apr 07, 2026
TraceGuard: Structured Multi-Dimensional Monitoring as a Collusion-Resistant Control Protocol

arXiv:2604.03968v1 Announce Type: new Abstract: AI control protocols use monitors to detect attacks by untrusted AI agents, but standard single-score monitors face two limitations: they miss subtle at…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Automating Cloud Security and Forensics Through a Secure-by-Design Generative AI Framework

arXiv:2604.03912v1 Announce Type: new Abstract: As cloud environments become increasingly complex, cybersecurity and forensic investigations must evolve to meet emerging threats. Large Language Models…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Improving ML Attacks on LWE with Data Repetition and Stepwise Regression

arXiv:2604.03903v1 Announce Type: new Abstract: The Learning with Errors (LWE) problem is a hard math problem in lattice-based cryptography. In the simplest case of binary secrets, it is the subset su…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Search-Bound Proximity Proofs: Binding Encrypted Geographic Search to Zero-Knowledge Verification

arXiv:2604.03902v1 Announce Type: new Abstract: Location-based systems that combine encrypted geographic search with zero-knowledge proximity proofs typically treat the two phases as independent. Unde…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Context-Binding Gaps in Stateful Zero-Knowledge Proximity Proofs: Taxonomy, Separation, and Mitigation

arXiv:2604.03900v1 Announce Type: new Abstract: A zero-knowledge proximity proof certifies geometric nearness but carries no commitment to an application context. In stateful geo-content systems, wher…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Graduated Trust Gating for IoT Location Verification: Trading Off Detection and Proof Escalation

arXiv:2604.03896v1 Announce Type: new Abstract: IoT location services accept client-reported GPS coordinates at face value, yet spoofing is trivial with consumer-grade tools. Existing spoofing detecto…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
From High-Level Types to Low-Level Monitors: Synthesizing Verified Runtime Checkers for MAVLink

arXiv:2604.03886v1 Announce Type: new Abstract: Standard communication protocols for Unmanned Aerial Vehicles (UAVs), such as MAVLink, lack the capability to enforce the contextual validity of message…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
SecureAFL: Secure Asynchronous Federated Learning

arXiv:2604.03862v1 Announce Type: new Abstract: Federated learning (FL) enables multiple clients to collaboratively train a global machine learning model via a server without sharing their private tra…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
LiquiLM: Bridging the Semantic Gap in Liquidity Flaw Audit via DCN and LLMs

arXiv:2604.03860v1 Announce Type: new Abstract: Traditional consensus mechanisms, such as Proof of Stake (PoS), increasingly reveal an excessive dependency on large liquidity providers. Although the P…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Defending Buffer Overflows in WebAssembly: A Transpiler Approach

arXiv:2604.03859v1 Announce Type: new Abstract: WebAssembly is quickly becoming a popular compilation target for a variety of code. However, vulnerabilities in the source languages translate to vulner…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Safety and Liveness of Cross-Domain State Preservation under Byzantine Faults: A Mechanized Proof in Isabelle/HOL

arXiv:2604.03844v1 Announce Type: new Abstract: Formally guaranteeing the safety and liveness of regulatory state transitions in cross-domain state synchronization systems is a problem of growing impo…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Explainability-Guided Adversarial Attacks on Transformer-Based Malware Detectors Using Control Flow Graphs

arXiv:2604.03843v1 Announce Type: new Abstract: Transformer-based malware detection systems operating on graph modalities such as control flow graphs (CFGs) achieve strong performance by modeling stru…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Partial Number Theoretic Transform Masking in Post Quantum Cryptography Hardware: A Security Margin Analysis

arXiv:2604.03813v1 Announce Type: new Abstract: Adams Bridge, a hardware accelerator for ML-DSA and ML-KEM designed for the Caliptra root of trust, masks 1 of its Inverse Number Theoretic Transform (I…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Systematic Integration of Digital Twins and Constrained LLMs for Interpretable Cyber-Physical Anomaly Detection

arXiv:2604.03790v1 Announce Type: new Abstract: Cyber attacks targeting Industrial Control Systems (ICS) have become increasingly sophisticated and hard to identify. Detecting such attacks requires in…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Spatiotemporal-Aware Bit-Flip Injection on DNN-based Advanced Driver Assistance Systems

arXiv:2604.03753v1 Announce Type: new Abstract: Modern advanced driver assistance systems (ADAS) rely on deep neural networks (DNNs) for perception and planning. Since DNNs' parameters reside in DRAM …

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
CREBench: Evaluating Large Language Models in Cryptographic Binary Reverse Engineering

arXiv:2604.03750v1 Announce Type: new Abstract: Reverse engineering (RE) is central to software security, particularly for cryptographic programs that handle sensitive data and are highly prone to vul…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Explainable PQC: A Layered Interpretive Framework for Post-Quantum Cryptographic Security Assumptions

arXiv:2604.03665v1 Announce Type: new Abstract: This paper studies how post-quantum cryptographic (PQC) security assumptions can be represented and communicated through a structured, layered framework…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
A Faceted Classification of Authenticator-Centric Authentication Techniques

arXiv:2604.03627v1 Announce Type: new Abstract: Authentication is a fundamental security means for protecting system resources. Authenticator-centric authentication techniques (AuthN Techniques) addre…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Perceptual Gaps: ASCII Art and Overlapping Audio as CAPTCHA

arXiv:2604.03612v1 Announce Type: new Abstract: As multimodal large language models (LLMs) advance, traditional CAPTCHAs have become obsolete at distinguishing humans from bots. To address this shift,…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
Optimal Circuit Synthesis of Linear Codes for Error Detection and Correction

arXiv:2604.03608v1 Announce Type: new Abstract: Fault injection attacks deliberately inject faults into a device via physical channels to disturb its regular execution. Adversaries can effectively ded…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
AttackEval: A Systematic Empirical Study of Prompt Injection Attack Effectiveness Against Large Language Models

arXiv:2604.03598v1 Announce Type: new Abstract: Prompt injection has emerged as a critical vulnerability in large language model (LLM) deployments, yet existing research is heavily weighted toward def…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
ProtoGuard-SL: Prototype Consistency Based Backdoor Defense for Vertical Split Learning

arXiv:2604.03595v1 Announce Type: new Abstract: Vertical split learning (SL) enables collaborative model training across parties holding complementary features without sharing raw data, but recent wor…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
SecPI: Secure Code Generation with Reasoning Models via Security Reasoning Internalization

arXiv:2604.03587v1 Announce Type: new Abstract: Reasoning language models (RLMs) are increasingly used in programming. Yet, even state-of-the-art RLMs frequently introduce critical security vulnerabil…

arXiv Security Read →
◬ AI & Machine Learning Apr 07, 2026
CIPHR: Cryptography Inspired IP Protection through Fine-Grain Hardware Redaction

arXiv:2604.03560v1 Announce Type: new Abstract: Hardware intellectual property (IP) in the globalized integrated circuit (IC) supply chain is exposed to a wide range of confidentiality and integrity a…

arXiv Security Read →
← Prev 60 / 115 Next →