arXiv:2603.27986v1 Announce Type: new Abstract: Federated learning (FL) enables distributed clients to collaboratively train a global model using local private data. Nevertheless, recent studies show …
cyberintel.kalymoon.com · 2828 articles · updated every 4 hours · grows forever
arXiv:2603.27986v1 Announce Type: new Abstract: Federated learning (FL) enables distributed clients to collaboratively train a global model using local private data. Nevertheless, recent studies show …
arXiv:2603.27918v1 Announce Type: new Abstract: Multimodal large language models (MLLMs) integrate information from multiple modalities such as text, images, audio, and video, enabling complex capabil…
arXiv:2603.27883v1 Announce Type: new Abstract: Reliable use of real-world data requires confidence that recorded evidence reflects what actually occurred at the moment of capture. In adversarial or i…
arXiv:2603.27739v1 Announce Type: new Abstract: Centralized stablecoins such as USDT and USDC enforce financial sanctions through contract-layer blacklist functions, yet on public blockchains a freeze…
arXiv:2603.27517v1 Announce Type: new Abstract: AI agent frameworks connecting large language model (LLM) reasoning to host execution surfaces--shell, filesystem, containers, and messaging--introduce …
arXiv:2603.27439v1 Announce Type: new Abstract: The dependability of AI models relies largely on the reliability of the underlying computation hardware. Hardware aging attacks can compromise the compu…
arXiv:2603.27326v1 Announce Type: new Abstract: Phishing attacks remain among the most prevalent cybersecurity threats, causing significant financial losses for individuals and organizations worldwide…
arXiv:2603.27204v1 Announce Type: new Abstract: Skills are increasingly used to extend LLM agents by packaging prompts, code, and configurations into reusable modules. As public registries and marketp…
arXiv:2603.27190v1 Announce Type: new Abstract: This paper extends the Kikuchi method to give algorithms for decisional $k$-sparse Learning With Errors (LWE) and $k$-sparse Learning Parity with Noise …
arXiv:2603.27148v1 Announce Type: new Abstract: When an LLM agent reads a confidential file, then writes a summary, then emails it externally, no single step is unsafe, but the sequence is a data leak…
arXiv:2603.27127v1 Announce Type: new Abstract: Web applications remain the dominant attack surface in cybersecurity, where vulnerabilities such as SQL injection, XSS, and business logic flaws continu…
arXiv:2603.27117v1 Announce Type: new Abstract: This paper investigates how gender shapes privacy decision-making in youth smart voice assistant (SVA) ecosystems. Using survey data from 469 Canadian y…
arXiv:2603.27094v1 Announce Type: new Abstract: Large Language Models (LLMs) consume vast quantities of human-generated content for both training and real-time inference, yet the creators of that cont…
arXiv:2603.27067v1 Announce Type: new Abstract: Timely resolution and disclosure of vulnerabilities are essential for maintaining the security of open-source software. However, many vulnerabilities re…
arXiv:2603.26970v1 Announce Type: new Abstract: Sending cryptocurrency to an email address or phone number should be as simple as a bank transfer, yet naive schemes that map identifiers directly to bl…
arXiv:2603.26963v1 Announce Type: new Abstract: Differentially private $K$-means clustering enables releasing cluster centers derived from a dataset while protecting the privacy of the individuals. No…
arXiv:2603.26890v1 Announce Type: new Abstract: Iris-based biometric identification is increasingly recognized for its significant accuracy and long-term stability compared to other biometric modaliti…
arXiv:2603.26833v1 Announce Type: new Abstract: Achieving high availability and robust security in Kubernetes requires more than reactive scaling and standard perimeter firewalls. Traditional autoscal…
arXiv:2603.26781v1 Announce Type: new Abstract: With the rapid advancement of AI technology, we have seen more and more concerns on data privacy, leading to some cutting-edge research on machine learn…
arXiv:2603.26733v1 Announce Type: new Abstract: We develop a formal theory of throughput in finite serial pipeline systems subject to stage multiplicative capacity perturbations, motivated by the depl…
CrowdStrike Gains 4% as Morgan Stanley Names It a Top AI Security Bet 24/7 Wall St.
Release: datasette-files 0.1a3 I'm working on integrating datasette-files into other plugins, such as datasette-extract . This necessitated a new release of the base plugin. owners_can_edit and owners…
Note that the main issues that people currently unknowingly face with local models mostly revolve around the harness and some intricacies around model chat templates and prompt construction. Sometimes…
Authors: Satvik Golechha*, Sid Black*, Joseph Bloom * Equal Contribution. This work was done as part of the Model Transparency team at the UK AI Security Institute (AISI). Our code is available on Git…