Search Results - Journal of Civil Engineering and Construction Technology

  1. Enhancing Visual Question Answering with Multimodal LLMs via Chain-of-Question Guided Retrieval-Augmented Generation

    Published in ArXiv cs.CV Recent Papers (2026)
    Get full text
    Online Article RSS Article
  2. A Robust Unsupervised Domain Adaptation Framework for Medical Image Classification Using RKHS-MMD

    Published in ArXiv cs.CV Recent Papers (2026)
    Get full text
    Online Article RSS Article
  3. Redefining AI Red Teaming in the Agentic Era: From Weeks to Hours

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  4. LIPPEN: A Lightweight In-Place Pointer Encryption Architecture for Pointer Integrity

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  5. Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  6. MOSAIC-Bench: Measuring Compositional Vulnerability Induction in Coding Agents

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  7. HELO Cryptography: A Lightweight Cryptographic System for Enhancing IoT Security in P2P Data Transmission

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  8. KVerus: Scalable and Resilient Formal Verification Proof Generation for Rust Code

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  9. GPUBreach: Privilege Escalation Attacks on GPUs using Rowhammer

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  10. Firmware Distribution as Attack Surface: A Security Study of ASIC Cryptocurrency Miners

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  11. Internet of Things Security: A Survey on Common Attacks

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  12. Tailored Prompts, Targeted Protection: Vulnerability-Specific LLM Analysis for Smart Contracts

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  13. ZK-Value: A Practical Zero-Knowledge System for Verifiable Data Valuation

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  14. From TinyGo to gc Compiler: Extending Zorya's Concolic Framework to Real-World Go Binaries

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  15. MEMSAD: Gradient-Coupled Anomaly Detection for Memory Poisoning in Retrieval-Augmented Agents

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. Exposing LLM Safety Gaps Through Mathematical Encoding:New Attacks and Systematic Analysis

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  17. Graph Reconstruction from Differentially Private GNN Explanations

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. DECKER: Domain-invariant Embedding for Cross-Keyboard Extraction and Recognition

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  19. ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  20. SkCC: Portable and Secure Skill Compilation for Cross-Framework LLM Agents

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article