Showing 41–60 of 468 results
/ Date/ Name
Apr 23, 2026Physically Unclonable Functions for Secure IoT Authentication and Hardware-Anchored AI Model IntegrityApr 23, 2026Position Paper: Denial-of-Service Against Multi-Round Transaction SimulationApr 22, 2026Adaptive Instruction Composition for Automated LLM Red-TeamingApr 22, 2026Image-Based Malware Type Classification on MalNet-Image Tiny: Effects of Multi-Scale Fusion, Transfer Learning, Data Augmentation, and Schedule-Free OptimizationApr 22, 2026Cross-Session Threats in AI Agents: Benchmark, Evaluation, and AlgorithmsApr 22, 2026A Ground-Truth-Based Evaluation of Vulnerability Detection Across Multiple EcosystemsApr 22, 2026Behavioral Consistency and Transparency Analysis on Large Language Model API GatewaysApr 22, 2026Layer 2 Blockchains Simplified: A Survey of Vector Commitment Schemes, ZKP Frameworks, Layer-2 Data Structures and Verkle TreesApr 22, 2026Residual Risk Analysis in Benign Code: How Far Are We? A Multi-Model Semantic and Structural Similarity ApproachApr 22, 2026VRSafe: A Secure Virtual Keyboard to Mitigate Keystroke Inference in Virtual RealityApr 22, 2026Breaking MCP with Function Hijacking Attacks: Novel Threats for Function Calling and Agentic ModelsApr 22, 2026Differentially Private Model MergingApr 22, 2026AVISE: Framework for Evaluating the Security of AI SystemsApr 22, 2026An Analysis of Attack Vectors Against FIDO2 AuthenticationApr 22, 2026Synthesizing Multi-Agent Harnesses for Vulnerability DiscoveryApr 22, 2026Fresh Masking Makes NTT Pipelines Composable: Machine-Checked Proofs for Arithmetic Masking in PQC HardwareApr 22, 2026DAIRE: A lightweight AI model for real-time detection of Controller Area Network attacks in the Internet of VehiclesApr 22, 2026Breaking Bad: Interpretability-Based Safety Audits of State-of-the-Art LLMsApr 22, 2026CVEs With a CVSS Score Greater Than or Equal to 9Apr 22, 2026Auto-ART: Structured Literature Synthesis and Automated Adversarial Robustness Testing