CyberIntel ⬡ News
★ Saved ◆ Cyber Reads

// AI & Machine Learning
Intel Feed

cyberintel.kalymoon.com  ·  2892 articles  ·  updated every 4 hours · grows forever

2892Total
2848Full Text
May 20, 2026Latest
◈ Women in Cyber ◉ Threat Intelligence ◎ How-To & Tutorials ⬡ Vulnerabilities & CVEs 🔍 Digital Forensics ◍ Incident Response & DFIR ◆ Security Tools & Reviews ◇ Industry News & Leadership ✉ Email Security 🛡 Active Threats ⚠ Critical CVEs ◐ Insider Threat & DLP ◌ Quantum Computing ◬ AI & Machine Learning
🔥 Trending Topics · Last 48h
◬ AI & Machine Learning Mar 23, 2026
NASimJax: GPU-Accelerated Policy Learning Framework for Penetration Testing

arXiv:2603.19864v1 Announce Type: cross Abstract: Penetration testing, the practice of simulating cyberattacks to identify vulnerabilities, is a complex sequential decision-making task that is inheren…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Acyclic Graph Pattern Counting under Local Differential Privacy

arXiv:2603.19671v1 Announce Type: cross Abstract: Graph pattern counting serves as a cornerstone of network analysis with extensive real-world applications. Its integration with local differential pri…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Variational Encrypted Model Predictive Control

arXiv:2603.19450v1 Announce Type: cross Abstract: We develop a variational encrypted model predictive control (VEMPC) protocol whose online execution relies only on encrypted polynomial operations. Th…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
DPxFin: Adaptive Differential Privacy for Anti-Money Laundering Detection via Reputation-Weighted Federated Learning

arXiv:2603.19314v1 Announce Type: cross Abstract: In the modern financial system, combating money laundering is a critical challenge complicated by data privacy concerns and increasingly complex fraud…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
MAPLE: Metadata Augmented Private Language Evolution

arXiv:2603.19258v1 Announce Type: cross Abstract: While differentially private (DP) fine-tuning of large language models (LLMs) is a powerful tool, it is often computationally prohibitive or infeasibl…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Improving Generalization on Cybersecurity Tasks with Multi-Modal Contrastive Learning

arXiv:2603.20181v1 Announce Type: new Abstract: The use of ML in cybersecurity has long been impaired by generalization issues: Models that work well in controlled scenarios fail to maintain performan…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
HQC Post-Quantum Cryptography Decryption with Generalized Minimum-Distance Reed-Solomon Decoder

arXiv:2603.20156v1 Announce Type: new Abstract: Hamming Quasi-Cyclic (HQC) was chosen for the latest post-quantum cryptography standardization. A concatenated Reed-Muller (RM) and Reed-Solomon (RS) co…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Evolving Jailbreaks: Automated Multi-Objective Long-Tail Attacks on Large Language Models

arXiv:2603.20122v1 Announce Type: new Abstract: Large Language Models (LLMs) have been widely deployed, especially through free Web-based applications that expose them to diverse user-generated inputs…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Sharing The Secret: Distributed Privacy-Preserving Monitoring

arXiv:2603.20107v1 Announce Type: new Abstract: In traditional runtime verification, a system is typically observed by a monolithic monitor. Enforcing privacy in such settings is computationally expen…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Trojan's Whisper: Stealthy Manipulation of OpenClaw through Injected Bootstrapped Guidance

arXiv:2603.19974v1 Announce Type: new Abstract: Autonomous coding agents are increasingly integrated into software development workflows, offering capabilities that extend beyond code suggestion to ac…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Channel Prediction-Based Physical Layer Authentication under Consecutive Spoofing Attacks

arXiv:2603.19962v1 Announce Type: new Abstract: Wireless networks are highly vulnerable to spoofing attacks, especially when attackers transmit consecutive spoofing packets. Conventional physical laye…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
TAPAS: Efficient Two-Server Asymmetric Private Aggregation Beyond Prio(+)

arXiv:2603.19949v1 Announce Type: new Abstract: Privacy-preserving aggregation is a cornerstone for AI systems that learn from distributed data without exposing individual records, especially in feder…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
A Theory of Composable Lingos for Protocol Dialects

arXiv:2603.19908v1 Announce Type: new Abstract: Formal patterns are formally specified solutions to frequently occurring distributed system problems that are generic, executable, and come with strong …

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Case Study: Horizontal Side-Channel Analysis Attack against Elliptic Curve Scalar Multiplication Accelerator under Laser Illumination

arXiv:2603.19811v1 Announce Type: new Abstract: Devices employing cryptographic approaches have to be resistant to physical attacks. Side-Channel Analysis (SCA) and Fault Injection (FI) attacks are fr…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Text-Based Personas for Simulating User Privacy Decisions

arXiv:2603.19791v1 Announce Type: new Abstract: The ability to simulate human privacy decisions has significant implications for aligning autonomous agents with individual intent and conducting cost-e…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Kumo: A Security-Focused Serverless Cloud Simulator

arXiv:2603.19787v1 Announce Type: new Abstract: Serverless computing abstracts infrastructure management but also obscures system-level behaviors that can introduce security risks. Prior work has show…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
From Precise to Random: A Systematic Differential Fault Analysis of the Lightweight Block Cipher Lilliput

arXiv:2603.19781v1 Announce Type: new Abstract: At SAC 2013, Berger et al. first proposed the Extended Generalized Feistel Networks (EGFN) structure for the design of block ciphers with efficient diff…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
LiteAtt: Secure and Seamless IoT Services Using TinyML-based Self-Attestation as a Primitive

arXiv:2603.19727v1 Announce Type: new Abstract: As the Internet of Things (IoT) becomes an integral part of critical infrastructure, smart cities, and consumer networks, there has been an increase in …

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
ProHunter: A Comprehensive APT Hunting System Based on Whole-System Provenance

arXiv:2603.19658v1 Announce Type: new Abstract: Advanced Persistent Threats (APTs) remain difficult to detect due to their stealthy nature and long-term persistence. To tackle this challenge, provenan…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Cellular Automata based Resource Efficient Maximally Equidistributed Pseudo-Random Number Generators

arXiv:2603.19656v1 Announce Type: new Abstract: An equidistribution is a theoretical quality criteria that measures the uniformity of a linear pseudo-random number generator (PRNG). In this work, we f…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
A Framework for Formalizing LLM Agent Security

arXiv:2603.19469v1 Announce Type: new Abstract: Security in LLM agents is inherently contextual. For example, the same action taken by an agent may represent legitimate behavior or a security violatio…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
The Autonomy Tax: Defense Training Breaks LLM Agents

arXiv:2603.19423v1 Announce Type: new Abstract: Large language model (LLM) agents increasingly rely on external tools (file operations, API calls, database transactions) to autonomously complete compl…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
Automated Membership Inference Attacks: Discovering MIA Signal Computations using LLM Agents

arXiv:2603.19375v1 Announce Type: new Abstract: Membership inference attacks (MIAs), which enable adversaries to determine whether specific data points were part of a model's training dataset, have em…

arXiv Security Read →
◬ AI & Machine Learning Mar 23, 2026
A Novel Solution for Zero-Day Attack Detection in IDS using Self-Attention and Jensen-Shannon Divergence in WGAN-GP

arXiv:2603.19350v1 Announce Type: new Abstract: The increasing sophistication of cyber threats, especially zero-day attacks, poses a significant challenge to cybersecurity. Zero-day attacks exploit un…

arXiv Security Read →
← Prev 97 / 121 Next →