Showing 101–120 of 468 results
/ Date/ Name
Apr 21, 2026Sherpa.ai Privacy-Preserving Multi-Party Entity Alignment without Intersection Disclosure for Noisy IdentifiersApr 21, 2026DP-FlogTinyLLM: Differentially private federated log anomaly detection using Tiny LLMsApr 21, 2026Dual-Guard: Dual-Channel Latent Watermarking for Provenance and Tamper Localization in Diffusion ImagesApr 21, 2026ProjLens: Unveiling the Role of Projectors in Multimodal Model SafetyApr 21, 2026CHRONOS: A Hardware-Assisted Phase-Decoupled Framework for Secure Federated Learning in IoTApr 21, 2026Refute-or-Promote: An Adversarial Stage-Gated Multi-Agent Review Methodology for High-Precision LLM-Assisted Defect DiscoveryApr 21, 2026SAGE: Signal-Amplified Guided Embeddings for LLM-based Vulnerability DetectionApr 21, 2026ClawCoin: An Agentic AI-Native Cryptocurrency for Decentralized Agent EconomiesApr 21, 2026Security Is Relative: Training-Free Vulnerability Detection via Multi-Agent Behavioral Contract SynthesisApr 21, 2026Mechanistic Anomaly Detection via Functional AttributionApr 20, 2026Temporal UI State Inconsistency in Desktop GUI Agents: Formalizing and Defending Against TOCTOU Attacks on Computer-Use AgentsApr 20, 2026Blockchain-Driven AI-Enhanced Post-Quantum Multivariate Identity-based Signature and Privacy-Preserving Data Aggregation Scheme for Fog-enabled Flying Ad-Hoc NetworksApr 20, 2026ARES: Adaptive Red-Teaming and End-to-End Repair of Policy-Reward SystemApr 20, 2026Towards Understanding the Robustness of Sparse AutoencodersApr 20, 2026Towards Optimal Agentic Architectures for Offensive Security TasksApr 20, 2026From Finite Enumeration to Universal Proof: Ring-Theoretic Foundations for PQC Hardware Masking VerificationApr 20, 2026TrEEStealer: Stealing Decision Trees via Enclave Side ChannelsApr 20, 2026Beyond Indistinguishability: Measuring Extraction Risk in LLM APIsApr 20, 2026Do Privacy Policies Match with the Logs? An Empirical Study of Privacy Disclosure in Android Application LogsApr 20, 2026Different Paths to Harmful Compliance: Behavioral Side Effects and Mechanistic Divergence Across LLM Jailbreaks