Search Results

Refine Results
  1. Latent Adversarial Detection: Adaptive Probing of LLM Activations for Multi-Turn Attack Detection

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  2. TwinGate: Stateful Defense against Decompositional Jailbreaks in Untraceable Traffic via Asymmetric Contrastive Learning

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  3. WOOTdroid: Whole-system Online On-device Tracing for Android

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  4. MASCing: Configurable Mixture-of-Experts Behavior via Activation Steering Masks

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  5. Machine Unlearning for Class Removal through SISA-based Deep Neural Network Architectures

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  6. How Code Representation Shapes False-Positive Dynamics in Cross-Language LLM Vulnerability Detection

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  7. Distribution Estimation under the Infinity Norm

    Get full text
    Online Article RSS Article
  8. The Satoshi Overhang: Why the Bear Case is Bounded

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  9. VOW: Verifiable and Oblivious Watermark Detection for Large Language Models

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  10. SecGoal: A Benchmark for Security Goal Extraction and Formalization from Protocol Documents

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  11. SBN Explorer: An Empirical Study of Cryptographic Boolean Networks

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  12. SST-Guard: Detecting and Characterizing Server-Side Google Analytics in the Wild

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  13. Low Rank Adaptation for Adversarial Perturbation

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  14. Security Attack and Defense Strategies for Autonomous Agent Frameworks: A Layered Review with OpenClaw as a Case Study

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  15. Secure Cross-Silo Synthetic Genomic Data Generation

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. Tracking Conversations: Measuring Content and Identity Exposure on AI Chatbots

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  17. AdaBFL: Multi-Layer Defensive Adaptive Aggregation for Bzantine-Robust Federated Learning

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. Extending Temperature Scaling with Homogenizing Maps

    Get full text
    Online Article RSS Article
  19. Secret Stealing Attacks on Local LLM Fine-Tuning through Supply-Chain Model Code Backdoors

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  20. Understanding Adversarial Transferability in Vision-Language Models for Autonomous Driving: A Cross-Architecture Analysis

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article