CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2889 articles  ·  updated every 4 hours · grows forever

2889Total
2846Full Text
May 20, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Mar 27, 2026
Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information

arXiv:2506.11680v1 Announce Type: cross Abstract: LLM-based Conversational AIs (CAIs), also known as GenAI chatbots, like ChatGPT, are increasingly used across various domains, but they pose privacy r…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
TAAC: A gate into Trustable Audio Affective Computing

arXiv:2603.25570v1 Announce Type: new Abstract: With the emergence of AI techniques for depression diagnosis, the conflict between high demand and limited supply for depression screening has been sign…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Unveiling the Resilience of LLM-Enhanced Search Engines against Black-Hat SEO Manipulation

arXiv:2603.25500v1 Announce Type: new Abstract: The emergence of Large Language Model-enhanced Search Engines (LLMSEs) has revolutionized information retrieval by integrating web-scale search capabili…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Shape and Substance: Dual-Layer Side-Channel Attacks on Local Vision-Language Models

arXiv:2603.25403v1 Announce Type: new Abstract: On-device Vision-Language Models (VLMs) promise data privacy via local execution. However, we show that the architectural shift toward Dynamic High-Reso…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
ALPS: Automated Least-Privilege Enforcement for Securing Serverless Functions

arXiv:2603.25393v1 Announce Type: new Abstract: Serverless computing is increasingly adopted for AI-driven workloads due to its automatic scaling and pay-as-you-go model. However, its function-based a…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Multi-target Coverage-based Greybox Fuzzing

arXiv:2603.25354v1 Announce Type: new Abstract: In recent years, fuzzing has been widely applied not only to application software but also to system software, including the Linux kernel and firmware, …

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor Threats

arXiv:2603.25310v1 Announce Type: new Abstract: Deep learning (DL) has been widely studied for assisting applications of modern wireless communications. One of the applications is automatic modulation…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Physical Backdoor Attack Against Deep Learning-Based Modulation Classification

arXiv:2603.25304v1 Announce Type: new Abstract: Deep Learning (DL) has become a key technology that assists radio frequency (RF) signal classification applications, such as modulation classification. …

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Usability of Passwordless Authentication in Wi-Fi Networks: A Comparative Study of Passkeys and Passwords in Captive Portals

arXiv:2603.25290v1 Announce Type: new Abstract: Passkeys have recently emerged as a passwordless authentication mechanism, yet their usability in captive portals remains unexplored. This paper present…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening

arXiv:2603.25257v1 Announce Type: new Abstract: This paper investigates the susceptibility to model integrity attacks that overload virtual machines assigned by the k-means algorithm used for resource…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
zk-X509: Privacy-Preserving On-Chain Identity from Legacy PKI via Zero-Knowledge Proofs

arXiv:2603.25190v1 Announce Type: new Abstract: Public blockchains impose an inherent tension between regulatory compliance and user privacy. Existing on-chain identity solutions require centralized K…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
PIDP-Attack: Combining Prompt Injection with Database Poisoning Attacks on Retrieval-Augmented Generation Systems

arXiv:2603.25164v1 Announce Type: new Abstract: Large Language Models (LLMs) have demonstrated remarkable performance across a wide range of applications. However, their practical deployment is often …

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
The System Prompt Is the Attack Surface: How LLM Agent Configuration Shapes Security and Creates Exploitable Vulnerabilities

arXiv:2603.25056v1 Announce Type: new Abstract: System prompt configuration can make the difference between near-total phishing blindness and near-perfect detection in LLM email agents. We present Phi…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Efficient ML-DSA Public Key Management Method with Identity for PKI and Its Application

arXiv:2603.25043v1 Announce Type: new Abstract: With the rapid evolution of the Industrial Internet of Things (IIoT), the boundaries and scale of the Internet are continuously expanding. Consequently,…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
IrisFP: Adversarial-Example-based Model Fingerprinting with Enhanced Uniqueness and Robustness

arXiv:2603.24996v1 Announce Type: new Abstract: We propose IrisFP, a novel adversarial-example-based model fingerprinting framework that enhances both uniqueness and robustness by leveraging multi-bou…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
LiteGuard: Efficient Task-Agnostic Model Fingerprinting with Enhanced Generalization

arXiv:2603.24982v1 Announce Type: new Abstract: Task-agnostic model fingerprinting has recently gained increasing attention due to its ability to provide a universal framework applicable across divers…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Sovereign AI at the Front Door of Care: A Physically Unidirectional Architecture for Secure Clinical Intelligence

arXiv:2603.24898v1 Announce Type: new Abstract: We present a Sovereign AI architecture for clinical triage in which all inference is performed on-device and inbound data is delivered via a physically …

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
An Approach to Generate Attack Graphs with a Case Study on Siemens PCS7 Blueprint for Water Treatment Plants

arXiv:2603.24888v1 Announce Type: new Abstract: Assessing the security posture of Industrial Control Systems (ICS) is critical for protecting essential infrastructure. However, the complexity and scal…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Trusted-Execution Environment (TEE) for Solving the Replication Crisis in Academia

arXiv:2603.24878v1 Announce Type: new Abstract: The growing replication crisis across disciplines such as economics, finance, and other social sciences as well as computer science undermines the credi…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
AI Security in the Foundation Model Era: A Comprehensive Survey from a Unified Perspective

arXiv:2603.24857v1 Announce Type: new Abstract: As machine learning (ML) systems expand in both scale and functionality, the security landscape has become increasingly complex, with a proliferation of…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
Bridging Code Property Graphs and Language Models for Program Analysis

arXiv:2603.24837v1 Announce Type: new Abstract: Large Language Models (LLMs) face critical challenges when analyzing security vulnerabilities in real world codebases: token limits prevent loading enti…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
AIP: Agent Identity Protocol for Verifiable Delegation Across MCP and A2A

arXiv:2603.24775v1 Announce Type: new Abstract: AI agents increasingly call tools via the Model Context Protocol (MCP) and delegate to other agents via Agent-to-Agent (A2A), yet neither protocol verif…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
An Explainable Federated Framework for Zero Trust Micro-Segmentation in IIoT Networks

arXiv:2603.24754v1 Announce Type: new Abstract: Micro-segmentation as a core requirement of zero trust architecture (ZTA) divides networks into small security zones, called micro-segments, thereby min…

arXiv Security Read →
◬ AI & Machine Learning Mar 27, 2026
SolRugDetector: Investigating Rug Pulls on Solana

arXiv:2603.24625v1 Announce Type: new Abstract: Solana has experienced rapid growth due to its high performance and low transaction costs, but the extremely low barrier to token issuance has also led …

arXiv Security Read →
← Prev 85 / 121 Next →