Search Results

Refine Results
  1. A Pragmatic Comparison of Cryptographic Computation Technologies for Machine Learning

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  2. Data anonymization in the presence of outliers via invariant coordinate selection

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  3. Long-Term Risks of IoT Devices: The Case of the Smart Fridge

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  4. AgentTrust: Runtime Safety Evaluation and Interception for AI Agent Tool Use

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  5. Optimal Experiment Design for Causal Effect Identification

    Get full text
    Online Article RSS Article
  6. AFL-ICP: Enhancing Industrial Control Protocol Reliability via Specification-Guided Fuzzing

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  7. From Beats to Breaches:How Offensive AI Infers Sensitive User Information from Playlists

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  8. Vol-Mark: A Watermark for 3D Medical Volume Data Via Cubic Difference Expansion and Contrastive Learning

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  9. Sparse Tokens Suffice: Jailbreaking Audio Language Models via Token-Aware Gradient Optimization

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  10. Gray-Box Poisoning of Continuous Malware Ingestion Pipelines

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  11. Securing the Web with HSTS-Enforced

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  12. Fundamental Limitations of Post-Quantum Cryptographic Architectures

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  13. PINSIGHT: A Comprehensive Threat Exploration of Domain-Adaptive Wi-Fi based PIN Code Inference

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  14. Pen-Strategist: A Reasoning Framework for Penetration Testing Strategy Formation and Analysis

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  15. An Evaluation of Chat Safety Moderations in Roblox

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. Mean Aggregator is More Robust than Robust Aggregators under Label Poisoning Attacks on Distributed Heterogeneous Data

    Get full text
    Online Article RSS Article
  17. Order Flow Exclusivity and Value Extraction Mechanisms: An Analysis of Ethereum Builder Centralization

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. Misrouter: Exploiting Routing Mechanisms for Input-Only Attacks on Mixture-of-Experts LLMs

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  19. Assessing Generalisation Capability of Machine Learning Models for Intrusion Detection

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  20. SWAN: Semantic Watermarking with Abstract Meaning Representation

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article