CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2686 articles  ·  updated every 4 hours · grows forever

2686Total
2643Full Text
May 16, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning May 12, 2026
Spatial Priming Outperforms Semantic Prompting: A Grid-Based Approach to Improving LLM Accuracy on Chart Data Extraction

arXiv:2605.08220v1 Announce Type: new Abstract: The automated extraction of data from scientific charts is a critical task for large-scale literature analysis. While multimodal Large Language Models (…

arXiv AI Read →
◬ AI & Machine Learning May 12, 2026
Where Reliability Lives in Vision-Language Models: A Mechanistic Study of Attention, Hidden States, and Causal Circuits

arXiv:2605.08200v1 Announce Type: new Abstract: A pervasive intuition holds that vision-language models (VLMs) are most trustworthy when their attention maps look sharp: concentrated attention on the …

arXiv AI Read →
◬ AI & Machine Learning May 12, 2026
Privacy-Preserving Distributed Learning in IoT Systems: A Unified Threat Model and Evaluation Framework

arXiv:2605.09232v1 Announce Type: new Abstract: The increasing deployment of Internet-of-Things (IoT) devices has accelerated the use of distributed learning frameworks, where data remains local while…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
The Art of the Jailbreak: Formulating Jailbreak Attacks for LLM Security Beyond Binary Scoring

arXiv:2605.09225v1 Announce Type: new Abstract: Jailbreak attacks -- adversarial prompts that bypass LLM alignment through purely linguistic manipulation -- pose a growing operational security threat,…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Removing the Watermark Is Not Enough: Forensic Stealth in Generative-AI Watermark Removal

arXiv:2605.09203v1 Announce Type: new Abstract: Watermarks for AI-generated images are meant to support downstream decisions about provenance, manipulation, and trust. In the settings that motivate wa…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Smart Contract Security Beyond Detection

arXiv:2605.09124v1 Announce Type: new Abstract: Smart contract security has progressed from vulnerability detection toward a broader research agenda that includes semantic reasoning, automated repair,…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
AI Native Asset Intelligence

arXiv:2605.09115v1 Announce Type: new Abstract: Modern security environments generate fragmented signals across cloud resources, identities, configurations, and third-party security tools. Although AI…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Single-Configuration Attack Success Rate Is Not Enough: Jailbreak Evaluations Should Report Distributional Attack Success

arXiv:2605.09070v1 Announce Type: new Abstract: Many jailbreak attack research papers report attack success rates for a limited number of parameter settings, even though there are many combinations of…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
ShadowMerge: A Novel Poisoning Attack on Graph-Based Agent Memory via Relation-Channel Conflicts

arXiv:2605.09033v1 Announce Type: new Abstract: Graph-based agent memory is increasingly used in LLM agents to support structured long-term recall and multi-hop reasoning, but it also creates a new po…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Hardware-Accelerated Line-Rate Bitstream Screening for Secure FPGA Reconfiguration

arXiv:2605.08984v1 Announce Type: new Abstract: As Field-Programmable Gate Arrays (FPGAs) scale in multi-tenant cloud and edge-AI environments, the configuration bitstream has become a critical, yet o…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Toward Web 4.0: Bidirectional Trust between AI Agents and Blockchain

arXiv:2605.08922v1 Announce Type: new Abstract: Autonomous AI agents are increasingly deployed on blockchain platforms, yet the design space that governs their interaction remains poorly understood. T…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Enhancing Adversarial Robustness in Network Intrusion Detection: A Layer-wise Adaptive Regularization Approach

arXiv:2605.08910v1 Announce Type: new Abstract: The new wave of adversarial attacks that utilize gradient-related vulnerabilities in neural network-based classifiers makes Network Intrusion Detection …

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Why Do Aligned LLMs Remain Jailbreakable: Refusal-Escape Directions, Operator-Level Sources, and Safety-Utility Trade-off

arXiv:2605.08878v1 Announce Type: new Abstract: Aligned large language models (LLMs) remain vulnerable to jailbreak attacks. Recent mechanistic studies have identified latent features and representati…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
When LLMs Team Up: A Coordinated Attack Framework for Automated Cyber Intrusions

arXiv:2605.08763v1 Announce Type: new Abstract: Automated intrusion-style workflows require LLM agents to reason over partial observations, tool outputs, and executable artifacts under bounded budgets…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
AI-Accelerated Brute Force Cryptanalysis

arXiv:2605.08690v1 Announce Type: new Abstract: Modern cryptography is hinged on "not learning from mistakes": trying numerous wrong keys, should not help one identify the right key. Indeed, it worked…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
WATSON: Leveraging Data Watchpoints for Shadow Stack Protection on Embedded Systems

arXiv:2605.08604v1 Announce Type: new Abstract: Embedded and Internet-of-Things (IoT) devices play a critical role in modern life. Their software and firmware, often developed in memory-unsafe languag…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Computer Science Conferences Should Require Nonrepudiable Experimental Results

arXiv:2605.08586v1 Announce Type: new Abstract: This position paper argues that computer science conferences should require tamper-evident, nonrepudiable attestations of experimental results. We name …

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
When Child Inherits: Modeling and Exploiting Subagent Spawn in Multi-Agent Networks

arXiv:2605.08460v1 Announce Type: new Abstract: Since the official release of ChatGPT in 2022, large language models (LLMs) have rapidly evolved from chatbot-style interfaces into agentic systems that…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
HEART: A High-Efficiency Adaptive Real-Time Telemonitoring Framework for Secure Electrocardiogram Signal Transmission Using Chaotic Encryption

arXiv:2605.08456v1 Announce Type: new Abstract: The realtime analysis and secure transmission of electrocardiogram ECG signals are critical for accurate diagnosis and safeguarding patient privacy in t…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
SL5 Standard for AI Security

arXiv:2605.08449v1 Announce Type: new Abstract: Security Level 5 (SL5) is a security posture for AI systems that could plausibly thwart top-priority operations by the world's most cyber-capable instit…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Improving Parameter-Efficient Federated Learning with Differentially Private Refactorization

arXiv:2605.08443v1 Announce Type: new Abstract: Federated Learning (FL) with parameter-efficient fine-tuning, such as Low-Rank Adaptation (LoRA), enables scalable model training on distributed data. H…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Defense effectiveness across architectural layers: a mechanistic evaluation of persistent memory attacks on stateful LLM agents

arXiv:2605.08442v1 Announce Type: new Abstract: Persistent memory attacks against LLM agents achieve high attack success rates against open-source models. In these attacks, malicious instructions inje…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Deterministic Fully-Static Whole-Binary Translation without Heuristics

arXiv:2605.08419v1 Announce Type: new Abstract: We present Elevator, the first binary translator that statically translates entire x86-64 executables to AArch64 without debug information, source code,…

arXiv Security Read →
◬ AI & Machine Learning May 12, 2026
Binge, Bot, Repeat: Unpacking the Ecosystem of Video Piracy on Telegram

arXiv:2605.08418v1 Announce Type: new Abstract: Telegram has emerged as a major platform for large-scale video piracy, where copyrighted content is rapidly distributed among users. Despite its promine…

arXiv Security Read →
← Prev 9 / 112 Next →