Showing 201–220 of 468 results
/ Date/ Name
Apr 14, 2026Understanding and Improving Continuous Adversarial Training for LLMs via In-context Learning TheoryApr 7, 2026Towards Resilient Intrusion Detection in CubeSats: Challenges, TinyML Solutions, and Future DirectionsApr 4, 2026Measuring the Permission Gate: A Stress-Test Evaluation of Claude Code's Auto ModeApr 3, 2026Poison Once, Exploit Forever: Environment-Injected Memory Poisoning Attacks on Web AgentsMar 31, 2026SHIFT: Stochastic Hidden-Trajectory Deflection for Removing Diffusion-based WatermarkMar 26, 2026An Approach to Generate Attack Graphs with a Case Study on Siemens PCS7 Blueprint for Water Treatment PlantsMar 24, 2026The Power of Power Codes: New Classes of Easy Instances for the Linear Equivalence ProblemMar 20, 2026Evolving Jailbreaks: Automated Multi-Objective Long-Tail Attacks on Large Language ModelsMar 2, 2026SDN-SYN PoW: Adaptive Ingress-Aware Defense with Non-Interactive PoW Against Volumetric SYN FloodsFeb 27, 2026A traffic analysis attack against Introduction Protocol and Onion ServicesFeb 26, 2026Lap2: Revisiting Laplace DP-SGD for High Dimensions via Majorization TheoryFeb 26, 2026Privacy-Preserving Proof of Human Authorship via Zero-Knowledge Process AttestationFeb 26, 2026A TEE-Based Architecture for Confidential and Dependable Process Attestation in Authorship VerificationFeb 26, 2026Detecting Cognitive Signatures in Typing Behavior for Non-Intrusive Authorship VerificationFeb 12, 2026Legitimate Overrides in Decentralized ProtocolsFeb 2, 2026Eidolon: A Post-Quantum Signature Scheme Based on k-Colorability in the Age of Graph Neural NetworksJan 30, 2026Hide and Seek in Embedding Space: Geometry-based Steganography and Detection in Large Language ModelsJan 19, 2026SWORD: A Secure LoW-Latency Offline-First Authentication and Data Sharing Scheme for Resource Constrained Distributed NetworksJan 5, 2026AgentMark: Utility-Preserving Behavioral Watermarking for AgentsDec 23, 2025SemCovert: Secure and Covert Video Transmission via Deep Semantic-Level Hiding