Full Text Available
Access Full Text at Repository
Search Results - "Technology"
-
GESR: Graph-Based Edge Semantic Reconstruction for Stealthy Communication Detection with Benign-Only Training
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
Online Article RSS Article -
Resilience of IEC 61850 Sampled Values-Based Protection Systems Under Coordinated False Data Injections
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
An Automated Framework for Cybersecurity Policy Compliance Assessment Against Security Control Standards
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Cross-Modal Backdoors in Multimodal Large Language Models
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Spying Across Chiplets: Side-Channel Attacks in 2.5/3D Integrated Systems
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Vaporizer: Breaking Watermarking Schemes for Large Language Model Outputs
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Forensic analysis of video data deletion and recovery in Honeywell surveillance file system
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
From Conceptual Scaffold to Prototype: A Standardized Zonal Architecture for Wi-Fi Security Training
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Combating Organized Platform Abuse: Amplifying Weak Risk Signals with Structural Information
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
A Unified Open-Set Framework for Scalable PUF-Based Authentication of Heterogeneous IoT Devices
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Activation Differences Reveal Backdoors: A Comparison of SAE Architectures
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
When the Ruler is Broken: Parsing-Induced Suppression in LLM-Based Security Log Evaluation
Published in ArXiv cs.CR Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
LLMs Improving LLMs: Agentic Discovery for Test-Time Scaling
Published in ArXiv cs.CL Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Conformal Path Reasoning: Trustworthy Knowledge Graph Question Answering via Path-Level Calibration
Published in ArXiv cs.CL Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
CA-SQL: Complexity-Aware Inference Time Reasoning for Text-to-SQL via Exploration and Compute Budget Allocation
Published in ArXiv cs.CL Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Accurate and Efficient Statistical Testing for Word Semantic Breadth
Published in ArXiv cs.CL Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Uncertainty-Aware Structured Data Extraction from Full CMR Reports via Distilled LLMs
Published in ArXiv cs.CL Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
Ask Early, Ask Late, Ask Right: When Does Clarification Timing Matter for Long-Horizon Agents?
Published in ArXiv cs.CL Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
How to Train Your Latent Diffusion Language Model Jointly With the Latent Space
Published in ArXiv cs.CL Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text
-
How Value Induction Reshapes LLM Behaviour
Published in ArXiv cs.CL Recent Papers (2026)Subjects: “…Engineering & Technology…”
Get full text