Full Text Available
Access Full Text at Repository
Search Results - "Technology"
-
Agentic Vulnerability Reasoning on Windows COM Binaries
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
Online Article RSS Article -
You Snooze, You Lose: Automatic Safety Alignment Restoration through Neural Weight Translation
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Probabilistic Atomic Swaps for Bitcoin and Friends
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
On the (In-)Security of the Shuffling Defense in the Transformer Secure Inference
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
A Pragmatic Comparison of Cryptographic Computation Technologies for Machine Learning
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Data anonymization in the presence of outliers via invariant coordinate selection
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Long-Term Risks of IoT Devices: The Case of the Smart Fridge
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
AgentTrust: Runtime Safety Evaluation and Interception for AI Agent Tool Use
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
AFL-ICP: Enhancing Industrial Control Protocol Reliability via Specification-Guided Fuzzing
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
From Beats to Breaches:How Offensive AI Infers Sensitive User Information from Playlists
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Vol-Mark: A Watermark for 3D Medical Volume Data Via Cubic Difference Expansion and Contrastive Learning
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Sparse Tokens Suffice: Jailbreaking Audio Language Models via Token-Aware Gradient Optimization
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Gray-Box Poisoning of Continuous Malware Ingestion Pipelines
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Securing the Web with HSTS-Enforced
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Fundamental Limitations of Post-Quantum Cryptographic Architectures
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
PINSIGHT: A Comprehensive Threat Exploration of Domain-Adaptive Wi-Fi based PIN Code Inference
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Pen-Strategist: A Reasoning Framework for Penetration Testing Strategy Formation and Analysis
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
An Evaluation of Chat Safety Moderations in Roblox
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Order Flow Exclusivity and Value Extraction Mechanisms: An Analysis of Ethereum Builder Centralization
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Misrouter: Exploiting Routing Mechanisms for Input-Only Attacks on Mixture-of-Experts LLMs
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text