arXiv:2506.11680v1 Announce Type: cross Abstract: LLM-based Conversational AIs (CAIs), also known as GenAI chatbots, like ChatGPT, are increasingly used across various domains, but they pose privacy r…
cyberintel.kalymoon.com · 2889 articles · updated every 4 hours · grows forever
arXiv:2506.11680v1 Announce Type: cross Abstract: LLM-based Conversational AIs (CAIs), also known as GenAI chatbots, like ChatGPT, are increasingly used across various domains, but they pose privacy r…
arXiv:2603.25570v1 Announce Type: new Abstract: With the emergence of AI techniques for depression diagnosis, the conflict between high demand and limited supply for depression screening has been sign…
arXiv:2603.25500v1 Announce Type: new Abstract: The emergence of Large Language Model-enhanced Search Engines (LLMSEs) has revolutionized information retrieval by integrating web-scale search capabili…
arXiv:2603.25403v1 Announce Type: new Abstract: On-device Vision-Language Models (VLMs) promise data privacy via local execution. However, we show that the architectural shift toward Dynamic High-Reso…
arXiv:2603.25393v1 Announce Type: new Abstract: Serverless computing is increasingly adopted for AI-driven workloads due to its automatic scaling and pay-as-you-go model. However, its function-based a…
arXiv:2603.25354v1 Announce Type: new Abstract: In recent years, fuzzing has been widely applied not only to application software but also to system software, including the Linux kernel and firmware, …
arXiv:2603.25310v1 Announce Type: new Abstract: Deep learning (DL) has been widely studied for assisting applications of modern wireless communications. One of the applications is automatic modulation…
arXiv:2603.25304v1 Announce Type: new Abstract: Deep Learning (DL) has become a key technology that assists radio frequency (RF) signal classification applications, such as modulation classification. …
arXiv:2603.25290v1 Announce Type: new Abstract: Passkeys have recently emerged as a passwordless authentication mechanism, yet their usability in captive portals remains unexplored. This paper present…
arXiv:2603.25257v1 Announce Type: new Abstract: This paper investigates the susceptibility to model integrity attacks that overload virtual machines assigned by the k-means algorithm used for resource…
arXiv:2603.25190v1 Announce Type: new Abstract: Public blockchains impose an inherent tension between regulatory compliance and user privacy. Existing on-chain identity solutions require centralized K…
arXiv:2603.25164v1 Announce Type: new Abstract: Large Language Models (LLMs) have demonstrated remarkable performance across a wide range of applications. However, their practical deployment is often …
arXiv:2603.25056v1 Announce Type: new Abstract: System prompt configuration can make the difference between near-total phishing blindness and near-perfect detection in LLM email agents. We present Phi…
arXiv:2603.25043v1 Announce Type: new Abstract: With the rapid evolution of the Industrial Internet of Things (IIoT), the boundaries and scale of the Internet are continuously expanding. Consequently,…
arXiv:2603.24996v1 Announce Type: new Abstract: We propose IrisFP, a novel adversarial-example-based model fingerprinting framework that enhances both uniqueness and robustness by leveraging multi-bou…
arXiv:2603.24982v1 Announce Type: new Abstract: Task-agnostic model fingerprinting has recently gained increasing attention due to its ability to provide a universal framework applicable across divers…
arXiv:2603.24898v1 Announce Type: new Abstract: We present a Sovereign AI architecture for clinical triage in which all inference is performed on-device and inbound data is delivered via a physically …
arXiv:2603.24888v1 Announce Type: new Abstract: Assessing the security posture of Industrial Control Systems (ICS) is critical for protecting essential infrastructure. However, the complexity and scal…
arXiv:2603.24878v1 Announce Type: new Abstract: The growing replication crisis across disciplines such as economics, finance, and other social sciences as well as computer science undermines the credi…
arXiv:2603.24857v1 Announce Type: new Abstract: As machine learning (ML) systems expand in both scale and functionality, the security landscape has become increasingly complex, with a proliferation of…
arXiv:2603.24837v1 Announce Type: new Abstract: Large Language Models (LLMs) face critical challenges when analyzing security vulnerabilities in real world codebases: token limits prevent loading enti…
arXiv:2603.24775v1 Announce Type: new Abstract: AI agents increasingly call tools via the Model Context Protocol (MCP) and delegate to other agents via Agent-to-Agent (A2A), yet neither protocol verif…
arXiv:2603.24754v1 Announce Type: new Abstract: Micro-segmentation as a core requirement of zero trust architecture (ZTA) divides networks into small security zones, called micro-segments, thereby min…
arXiv:2603.24625v1 Announce Type: new Abstract: Solana has experienced rapid growth due to its high performance and low transaction costs, but the extremely low barrier to token issuance has also led …