Showing 61–80 of 468 results
/ Date/ Name
Apr 22, 2026SoK: The Next Frontier in AV Security: Systematizing Perception Attacks and the Emerging Threat of Multi-Sensor FusionApr 22, 2026Differentially Private Clustered Federated Learning with Privacy-Preserving Initialization and Normality-Driven AggregationApr 22, 2026PVAC: A RowHammer Mitigation Architecture Exploiting Per-victim-row CountingApr 22, 2026Mythos and the Unverified Cage: Z3-Based Pre-Deployment Verification for Frontier-Model Sandbox InfrastructureApr 22, 2026Towards Certified Malware Detection: Provable Guarantees Against Evasion AttacksApr 22, 2026SDNGuardStack: An Explainable Ensemble Learning Framework for High-Accuracy Intrusion Detection in Software-Defined NetworksApr 22, 2026Adaptive Defense Orchestration for RAG: A Sentinel-Strategist Architecture against Multi-Vector AttacksApr 22, 2026Onyx: Cost-Efficient Disk-Oblivious ANN SearchApr 22, 2026SafeRedirect: Defeating Internal Safety Collapse via Task-Completion Redirection in Frontier LLMsApr 22, 2026CyberCertBench: Evaluating LLMs in Cybersecurity Certification KnowledgeApr 22, 2026TLSCheck 2.0: An Enhanced Memory Forensics Approach to Efficiently Detect TLS CallbacksApr 22, 2026Hidden Secrets in the arXiv: Discovering, Analyzing, and Preventing Unintentional Information Disclosure in Source Files of Scientific PreprintsApr 22, 2026Text Steganography with Dynamic Codebook and Multimodal Large Language ModelApr 22, 2026TL-RL-FusionNet: An Adaptive and Efficient Reinforcement Learning-Driven Transfer Learning Framework for Detecting Evolving Ransomware ThreatsApr 22, 2026Secure Rate-Distortion-Perception: A Randomized Distributed Function Computation Approach for RealismApr 22, 2026Towards Secure Logging: Characterizing and Benchmarking Logging Code Security Issues with LLMsApr 22, 2026Taint-Style Vulnerability Detection and Confirmation for Node.js Packages Using LLM Agent ReasoningApr 22, 2026AgentSOC: A Multi-Layer Agentic AI Framework for Security Operations AutomationApr 22, 2026Omission Constraints Decay While Commission Constraints Persist in Long-Context LLM AgentsApr 21, 2026Federated Learning over Blockchain-Enabled Cloud Infrastructure