arXiv:2603.29020v1 Announce Type: new Abstract: Reliable evaluation of AI agents operating in complex, real-world environments requires methodologies that are robust, transparent, and contextually ali…
cyberintel.kalymoon.com · 2828 articles · updated every 4 hours · grows forever
arXiv:2603.29020v1 Announce Type: new Abstract: Reliable evaluation of AI agents operating in complex, real-world environments requires methodologies that are robust, transparent, and contextually ali…
arXiv:2603.28990v1 Announce Type: new Abstract: How much autonomy can multi-agent LLM systems sustain -- and what enables it? We present a 25,000-task computational experiment spanning 8 models, 4--25…
arXiv:2603.28986v1 Announce Type: new Abstract: Current Autonomous Scientific Research (ASR) systems, despite leveraging large language models (LLMs) and agentic architectures, remain constrained by f…
arXiv:2603.28955v1 Announce Type: new Abstract: This paper presents the World-Action Model (WAM), an action-regularized world model that jointly reasons over future visual observations and the actions…
arXiv:2603.28928v1 Announce Type: new Abstract: We present the first comprehensive study of emergent social organization among AI agents in hierarchical multi-agent systems, documenting the spontaneou…
arXiv:2603.28906v1 Announce Type: new Abstract: AGI has become the Holly Grail of AI with the promise of level intelligence and the major Tech companies around the world are investing unprecedented am…
arXiv:2603.28902v1 Announce Type: new Abstract: Charts are central to analytical reasoning, yet existing benchmarks for chart understanding focus almost exclusively on single-chart interpretation rath…
arXiv:2603.28942v1 Announce Type: cross Abstract: The pervasive deployment of deep learning models across critical domains has concurrently intensified privacy concerns due to their inherent propensit…
arXiv:2603.28846v1 Announce Type: cross Abstract: This whitepaper seeks to elucidate implications that the capabilities of developing quantum architectures have on blockchain vulnerabilities and mitig…
arXiv:2603.30034v1 Announce Type: new Abstract: Random subspace method has wide security applications such as providing certified defenses against adversarial and backdoor attacks, and building robust…
arXiv:2603.30016v1 Announce Type: new Abstract: AI agents, predominantly powered by large language models (LLMs), are vulnerable to indirect prompt injection, in which malicious instructions embedded …
arXiv:2603.29907v1 Announce Type: new Abstract: Assistive technologies increasingly support independence, accessibility, and safety for older adults, people with disabilities, and individuals requirin…
arXiv:2603.29800v1 Announce Type: new Abstract: Speculative execution enhances processor performance by predicting intermediate results and executing instructions based on these predictions. However, …
arXiv:2603.29749v1 Announce Type: new Abstract: Trusted Execution Environments (TEEs) allow the secure execution of code on remote systems without the need to trust their operators. They use static at…
arXiv:2603.29688v1 Announce Type: new Abstract: In low-altitude wireless networks (LAWN), federated learning (FL) enables collaborative intelligence among unmanned aerial vehicles (UAVs) and integrate…
arXiv:2603.29668v1 Announce Type: new Abstract: Mobile messaging apps are a fundamental communication infrastructure, used by billions of people every day to share information, including sensitive dat…
arXiv:2603.29636v1 Announce Type: new Abstract: Mobile networks are essential for modern societies. The most recent generation of mobile networks will be even more ubiquitous than previous ones. There…
arXiv:2603.29537v1 Announce Type: new Abstract: Network traffic classification using self-supervised pre-training models based on Masked Autoencoders (MAE) has demonstrated a huge potential. However, …
arXiv:2603.29520v1 Announce Type: new Abstract: Encrypted traffic classification is a critical task for network security. While deep learning has advanced this field, the occlusion of payload semantic…
arXiv:2603.29403v1 Announce Type: new Abstract: LLM-as-a-Judge (LaaJ) is a novel paradigm in which powerful language models are used to assess the quality, safety, or correctness of generated outputs.…
arXiv:2603.29382v1 Announce Type: new Abstract: Lightweight cryptographic primitives are widely deployed in resource-constraint environment, particularly in the Internet of Things (IoT) devices. Due t…
arXiv:2603.29328v1 Announce Type: new Abstract: Backdoor attacks on federated learning (FL) are most often evaluated with synthetic corner patches or out-of-distribution (OOD) patterns that are unlike…
arXiv:2603.29289v1 Announce Type: new Abstract: The fast pace of modern AI is rapidly transforming traditional industrial systems into vast, intelligent and potentially unmanned autonomous operational…
arXiv:2603.29063v1 Announce Type: new Abstract: The major mobile platforms, Android and iOS, have introduced changes that restrict user tracking to improve user privacy, yet apps continue to covertly …