Showing 181–200 of 468 results
/ Date/ Name
Apr 17, 2026Benign Fine-Tuning Breaks Safety Alignment in Audio LLMsApr 17, 2026SafeLM: Unified Privacy-Aware Optimization for Trustworthy Federated Large Language ModelsApr 17, 2026PolicyGapper: Automated Detection of Inconsistencies Between Google Play Data Safety Sections and Privacy Policies Using LLMsApr 17, 2026Quantum-Resistant Quantum TeleportationApr 17, 2026ProcRoute: Process-Scoped Authorization of Split-Tunnel RoutesApr 17, 2026A Novel Framework for Transmitter Privacy in Integrated Sensing and CommunicationApr 17, 2026Modeling Sparse and Bursty Vulnerability Sightings: Forecasting Under Data ConstraintsApr 17, 2026MATRIX: Multi-Layer Code Watermarking via Dual-Channel Constrained Parity-Check EncodingApr 17, 2026Where Does MEV Really Come From? Revisiting CEXDEX Arbitrage on EthereumApr 17, 2026TwoHamsters: Benchmarking Multi-Concept Compositional Unsafety in Text-to-Image ModelsApr 17, 2026A Case Study on the Impact of Anonymization Along the RAG PipelineApr 17, 2026Low-Stack HAETAE for Memory-Constrained MicrocontrollersApr 17, 2026Module Lattice Security (Part I): Unconditional Verification of Weber's Conjecture for $k \le 12$Apr 17, 2026DPrivBench: Benchmarking LLMs' Reasoning for Differential PrivacyApr 17, 2026QUACK! Making the (Rubber) Ducky Talk: A Systematic Study of Keystroke Dynamics for HID Injection DetectionApr 17, 2026Polynomial Multiproofs for Scalable Data Availability Sampling in Blockchain Light ClientsApr 17, 2026A Protocol-Agnostic Backscatter-Based Security Layer for Ultra-Low-Power SWIPT IoT NetworksApr 17, 2026Beyond Text Prompts: Precise Concept Erasure through Text-Image CollaborationApr 17, 2026Secure Authentication in Wireless IoT: Hamming Code Assisted SRAM PUF as Device FingerprintApr 17, 2026PoSME: Proof of Sequential Memory Execution via Latency-Bound Pointer Chasing with Causal Hash Binding