Search Results - "Technology"

Refine Results
  1. Agentic Vulnerability Reasoning on Windows COM Binaries

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  2. You Snooze, You Lose: Automatic Safety Alignment Restoration through Neural Weight Translation

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  3. Probabilistic Atomic Swaps for Bitcoin and Friends

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  4. On the (In-)Security of the Shuffling Defense in the Transformer Secure Inference

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  5. A Pragmatic Comparison of Cryptographic Computation Technologies for Machine Learning

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  6. Data anonymization in the presence of outliers via invariant coordinate selection

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  7. Long-Term Risks of IoT Devices: The Case of the Smart Fridge

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  8. AgentTrust: Runtime Safety Evaluation and Interception for AI Agent Tool Use

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  9. AFL-ICP: Enhancing Industrial Control Protocol Reliability via Specification-Guided Fuzzing

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  10. From Beats to Breaches:How Offensive AI Infers Sensitive User Information from Playlists

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  11. Vol-Mark: A Watermark for 3D Medical Volume Data Via Cubic Difference Expansion and Contrastive Learning

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  12. Sparse Tokens Suffice: Jailbreaking Audio Language Models via Token-Aware Gradient Optimization

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  13. Gray-Box Poisoning of Continuous Malware Ingestion Pipelines

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  14. Securing the Web with HSTS-Enforced

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  15. Fundamental Limitations of Post-Quantum Cryptographic Architectures

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  16. PINSIGHT: A Comprehensive Threat Exploration of Domain-Adaptive Wi-Fi based PIN Code Inference

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  17. Pen-Strategist: A Reasoning Framework for Penetration Testing Strategy Formation and Analysis

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  18. An Evaluation of Chat Safety Moderations in Roblox

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  19. Order Flow Exclusivity and Value Extraction Mechanisms: An Analysis of Ethereum Builder Centralization

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article
  20. Misrouter: Exploiting Routing Mechanisms for Input-Only Attacks on Mixture-of-Experts LLMs

    Published in ArXiv cs.CR Recent Papers (2026)
    Subjects: “…Engineering & Technology…”
    Get full text
    Online Article RSS Article