Search Results

Refine Results
  1. CMTA: Leveraging Cross-Modal Temporal Artifacts for Generalizable AI-Generated Video Detection

    Published in ArXiv cs.CV Recent Papers (2026)
    Get full text
    Online Article RSS Article
  2. Faithful Extreme Image Rescaling with Learnable Reversible Transformation and Semantic Priors

    Published in ArXiv cs.CV Recent Papers (2026)
    Get full text
    Online Article RSS Article
  3. When RAG Chatbots Expose Their Backend: An Anonymized Case Study of Privacy and Security Risks in Patient-Facing Medical AI

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  4. Repurposing Image Diffusion Models for Adversarial Synthetic Structured Data: A Case Study of Ground Truth Drift

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  5. Self-Adaptive Multi-Agent LLM-Based Security Pattern Selection for IoT Systems

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  6. STARE: Step-wise Temporal Alignment and Red-teaming Engine for Multi-modal Toxicity Attack

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  7. ML-Bench&Guard: Policy-Grounded Multilingual Safety Benchmark and Guardrail for Large Language Models

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  8. KingsGuard: Enclave Data Protection Under Real-World TEE Vulnerabilities

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  9. ForesightFlow: An Information Leakage Score Framework for Prediction Markets

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  10. Degree of Interference: A General Framework For Causal Inference Under Interference

    Get full text
    Online Article RSS Article
  11. CleanBase: Detecting Malicious Documents in RAG Knowledge Databases

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  12. Integrating Log-Based Security Analytics in Agile Workflows: A Real-World Experience Report

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  13. Block-wise Codeword Embedding for Reliable Multi-bit Text Watermarking

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  14. Semia: Auditing Agent Skills via Constraint-Guided Representation Synthesis

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  15. Trident: Improving Malware Detection with LLMs and Behavioral Features

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. A Privacy-Preserving Approach to Conformance Checking

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  17. A Comparative Analysis of Machine Learning Models for Intrusion Detection in Intelligent Transport Systems

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. Jailbroken Frontier Models Retain Their Capabilities

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  19. Attention Is Where You Attack

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  20. I can't recognize (yet): Delayed Rendering to Defeat Visual Phishing Detectors

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article