Search Results

Refine Results
  1. ATTENTION-BASED MULTIPLE-REPRESENTATION METHOD FOR FINGERPRINT-PRESENTATION-ATTACK DETECTION

    Published in Computer Science (2025)
    Get full text
    Online Article RSS Article
  2. Delta-Adapter: Scalable Exemplar-Based Image Editing with Single-Pair Supervision

    Published in ArXiv cs.CV Recent Papers (2026)
    Get full text
    Online Article RSS Article
  3. One Token Per Frame: Reconsidering Visual Bandwidth in World Models for VLA Policy

    Published in ArXiv cs.CV Recent Papers (2026)
    Get full text
    Online Article RSS Article
  4. MedVIGIL: Evaluating Trustworthy Medical VLMs Under Broken Visual Evidence

    Published in ArXiv cs.CV Recent Papers (2026)
    Get full text
    Online Article RSS Article
  5. GLiGuard: Schema-Conditioned Classification for LLM Safeguard

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  6. Graph Representation Learning Augmented Model Manipulation on Federated Fine-Tuning of LLMs

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  7. Longitudinal Analyses of SAST Tools: A CodeQL Case Study

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  8. CyBiasBench: Benchmarking Bias in LLM Agents for Cyber-Attack Scenarios

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  9. Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  10. GRASP -- Graph-Based Anomaly Detection Through Self-Supervised Classification

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  11. CCX: Enabling Unmodified Intel SGX Applications on Arm CCA

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  12. Automatic indexation of Cultural Heritage 3D object

    Published in Computer Science (2025)
    Get full text
    Online Article RSS Article
  13. GESR: Graph-Based Edge Semantic Reconstruction for Stealthy Communication Detection with Benign-Only Training

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  14. Resilience of IEC 61850 Sampled Values-Based Protection Systems Under Coordinated False Data Injections

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  15. An Automated Framework for Cybersecurity Policy Compliance Assessment Against Security Control Standards

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  16. Cross-Modal Backdoors in Multimodal Large Language Models

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  17. Spying Across Chiplets: Side-Channel Attacks in 2.5/3D Integrated Systems

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  18. Vaporizer: Breaking Watermarking Schemes for Large Language Model Outputs

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  19. Forensic analysis of video data deletion and recovery in Honeywell surveillance file system

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  20. From Conceptual Scaffold to Prototype: A Standardized Zonal Architecture for Wi-Fi Security Training

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article