Search Results

Refine Results
  1. Firmware Distribution as Attack Surface: A Security Study of ASIC Cryptocurrency Miners

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  2. Internet of Things Security: A Survey on Common Attacks

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  3. Tailored Prompts, Targeted Protection: Vulnerability-Specific LLM Analysis for Smart Contracts

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  4. The Infinite Mutation Engine? Measuring Polymorphism in LLM-Generated Offensive Code

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  5. Lightning UQ Box: Uncertainty Quantification for Neural Networks

    Get full text
    Online Article RSS Article
  6. ZK-Value: A Practical Zero-Knowledge System for Verifiable Data Valuation

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  7. From TinyGo to gc Compiler: Extending Zorya's Concolic Framework to Real-World Go Binaries

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  8. MEMSAD: Gradient-Coupled Anomaly Detection for Memory Poisoning in Retrieval-Augmented Agents

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  9. Exposing LLM Safety Gaps Through Mathematical Encoding:New Attacks and Systematic Analysis

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  10. Graph Reconstruction from Differentially Private GNN Explanations

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  11. DECKER: Domain-invariant Embedding for Cross-Keyboard Extraction and Recognition

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  12. ARGUS: Defending LLM Agents Against Context-Aware Prompt Injection

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  13. SkCC: Portable and Secure Skill Compilation for Cross-Framework LLM Agents

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  14. Cryptographic Registry Provenance: Structural Defense Against Dependency Confusion in AI Package Ecosystems

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  15. SILMARILS: Information-Theoretic and Quantum-Secure Designated-Verifier Signatures

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. Scaling Data-Constrained Language Models

    Get full text
    Online Article RSS Article
  17. MAGE: Safeguarding LLM Agents against Long-Horizon Threats via Shadow Memory

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. OpenSeeker-v2: Pushing the Limits of Search Agents with Informative and High-Difficulty Trajectories

    Published in ArXiv cs.CL Recent Papers (2026)
    Get full text
    Online Article RSS Article
  19. EQUITRIAGE: A Fairness Audit of Gender Bias in LLM-Based Emergency Department Triage

    Published in ArXiv cs.CL Recent Papers (2026)
    Get full text
    Online Article RSS Article
  20. Logical Consistency as a Bridge: Improving LLM Hallucination Detection via Label Constraint Modeling between Responses and Self-Judgments

    Published in ArXiv cs.CL Recent Papers (2026)
    Get full text
    Online Article RSS Article