arXiv:2604.00942v1 Announce Type: cross Abstract: We introduce a differentially private manifold denoising framework that allows users to exploit sensitive reference datasets to correct noisy, non-pri…
cyberintel.kalymoon.com · 2819 articles · updated every 4 hours · grows forever
arXiv:2604.00942v1 Announce Type: cross Abstract: We introduce a differentially private manifold denoising framework that allows users to exploit sensitive reference datasets to correct noisy, non-pri…
arXiv:2604.00887v1 Announce Type: cross Abstract: Deep neural networks have demonstrated excellent performance in SAR target detection tasks but remain susceptible to adversarial attacks. Existing SAR…
arXiv:2604.00788v1 Announce Type: cross Abstract: This technical report presents methods developed by the UK AI Security Institute for assessing whether advanced AI systems reliably follow intended go…
arXiv:2604.00761v1 Announce Type: cross Abstract: Existing research on privacy-preserving Human Activity Recognition (HAR) typically evaluates methods against a binary paradigm: clear video versus a s…
arXiv:2604.00741v1 Announce Type: cross Abstract: Random Number Generators (RNGs) are crucial for applications ranging from cryptography to simulations. Depending on the source of randomness, RNGs are…
arXiv:2604.00702v1 Announce Type: cross Abstract: Due to their widespread use in industry, several techniques have been proposed in the literature to fuzz REST APIs. Existing fuzzers for REST APIs hav…
arXiv:2604.00657v1 Announce Type: cross Abstract: Smart contracts are self-executing programs that manage financial transactions on blockchain networks. Developers commonly rely on third-party code li…
arXiv:2604.00430v1 Announce Type: cross Abstract: Large language model (LLM)-based agents have recently gained considerable attention due to the powerful reasoning capabilities of LLMs. Existing resea…
arXiv:2604.01194v1 Announce Type: new Abstract: Large language models (LLMs) and their applications, such as agents, are highly vulnerable to prompt injection attacks. State-of-the-art prompt injectio…
arXiv:2604.01131v1 Announce Type: new Abstract: Code obfuscation is widely adopted in modern software development to protect intellectual property and hinder reverse engineering, but it also provides …
arXiv:2604.01127v1 Announce Type: new Abstract: Software-Defined Networking (SDN) is increasingly adopted to secure Internet-of-Things (IoT) networks due to its centralized control and programmable fo…
arXiv:2604.01092v1 Announce Type: new Abstract: WiFi is inherently vulnerable to eavesdropping because RF signals may penetrate many physical boundaries, such as walls and floors. LiFi, by contrast, i…
arXiv:2604.01079v1 Announce Type: new Abstract: There is a growing need for cybersecurity professionals with practical knowledge and experience to meet societal needs and comply with new standards and…
arXiv:2604.01052v1 Announce Type: new Abstract: "Vibe coding," in which developers delegate code generation to AI assistants and accept the output with little manual review, has gained rapid adoption …
arXiv:2604.01039v1 Announce Type: new Abstract: System Instructions in Large Language Models (LLMs) are commonly used to enforce safety policies, define agent behavior, and protect sensitive operation…
arXiv:2604.01014v1 Announce Type: new Abstract: Membership Inference Attacks (MIAs) serve as a fundamental auditing tool for evaluating training data leakage in machine learning models. However, exist…
arXiv:2604.00986v1 Announce Type: new Abstract: We study whether phone-use agents respect privacy while completing benign mobile tasks. This question has remained hard to answer because privacy-compli…
arXiv:2604.00704v1 Announce Type: new Abstract: Large-scale web applications are widely deployed with complex third-party components, inheriting security risks arising from component vulnerabilities. …
arXiv:2604.00627v1 Announce Type: new Abstract: Model merging has emerged as a powerful technique for combining specialized capabilities from multiple fine-tuned LLMs without additional training costs…
arXiv:2604.00560v1 Announce Type: new Abstract: The impending arrival of cryptographically relevant quantum computers (CRQCs) threatens the security foundations of modern software: Shor's algorithm br…
arXiv:2604.00546v1 Announce Type: new Abstract: Face recognition models operate in a client-server setting where a client extracts a compact face embedding and a server performs similarity search over…
arXiv:2604.00411v1 Announce Type: new Abstract: Authenticated private information retrieval (APIR) is the state-of-the-art error-detecting private information retrieval (ED-PIR), using Distributed Poi…
arXiv:2604.00387v1 Announce Type: new Abstract: RAG systems deployed across federal agencies for citizen-facing services are vulnerable to knowledge base poisoning attacks, where adversaries inject ma…
arXiv:2604.00303v1 Announce Type: new Abstract: CubeSats have democratised access to space for universities, start-ups and emerging space nations, but the same design decisions that reduce cost and co…