Showing 81–100 of 468 results
/ Date/ Name
Apr 21, 2026PASTA: A Patch-Agnostic Twofold-Stealthy Backdoor Attack on Vision TransformersApr 21, 2026Potentials and Pitfalls of Applying Federated Learning in Hardware AssuranceApr 21, 2026DECIFR: Domain-Aware Exfiltration of Circuit Information from Federated Gradient ReconstructionApr 21, 2026A Data-Free Membership Inference Attack on Federated Learning in Hardware AssuranceApr 21, 2026Efficient Arithmetic-and-Comparison Homomorphic Encryption with Space SwitchingApr 21, 2026Sensitivity Uncertainty Alignment in Large Language ModelsApr 21, 2026"We are currently clean on OPSEC": Why JD Can't EncryptApr 21, 2026An AI Agent Execution Environment to Safeguard User DataApr 21, 2026Adding Compilation Metadata To Binaries To Make Disassembly DecidableApr 21, 2026Cyber Defense Benchmark: Agentic Threat Hunting Evaluation for LLMs in SecOpsApr 21, 2026Evaluating LLM-Generated Obfuscated XSS Payloads for Machine Learning-Based DetectionApr 21, 2026When Graph Structure Becomes a Liability: A Critical Re-Evaluation of Graph Neural Networks for Bitcoin Fraud Detection under Temporal Distribution ShiftApr 21, 2026Cyclic Equalizability Characterized by Parikh VectorsApr 21, 2026EvoPatch-IoT: Evolution-Aware Cross-Architecture Vulnerability Retrieval and Patch-State Profiling for BusyBox-Based IoT FirmwareApr 21, 2026API Security Based on Automatic OpenAPI MappingApr 21, 2026Involuntary In-Context Learning: Exploiting Few-Shot Pattern Completion to Bypass Safety Alignment in GPT-5.4Apr 21, 2026Malicious ML Model Detection by Learning Dynamic BehaviorsApr 21, 2026Secure Storage and Privacy-Preserving Scanpath Comparison via Garbled Circuits in Eye TrackingApr 21, 2026Do Agents Dream of Root Shells? Partial-Credit Evaluation of LLM Agents in Capture The Flag ChallengesApr 21, 2026Towards a Systematic Risk Assessment of Deep Neural Network Limitations in Autonomous Driving Perception