We gratefully acknowledge support from
the Simons Foundation and member institutions.

Cryptography and Security

Authors and titles for recent submissions, skipping first 100

[ total of 182 entries: 1-250 | 101-182 ]
[ showing up to 250 entries per page: fewer | more ]

Tue, 2 Dec 2025 (continued, showing last 39 of 54 entries)

[101]  arXiv:2512.01353 [pdf, ps, other]
Title: The Trojan Knowledge: Bypassing Commercial LLM Guardrails via Harmless Prompt Weaving and Adaptive Tree Search
Subjects: Cryptography and Security (cs.CR)
[102]  arXiv:2512.01335 [pdf, ps, other]
Title: EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations
Comments: Accepted to ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[103]  arXiv:2512.01326 [pdf, ps, other]
Title: Securing Large Language Models (LLMs) from Prompt Injection Attacks
Comments: 10 pages, 1 figure, 1 table
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[104]  arXiv:2512.01295 [pdf, ps, other]
Title: Systems Security Foundations for Agentic Computing
Subjects: Cryptography and Security (cs.CR)
[105]  arXiv:2512.01255 [pdf, ps, other]
Title: Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL); Software Engineering (cs.SE)
[106]  arXiv:2512.01247 [pdf, ps, other]
Title: Benchmarking and Understanding Safety Risks in AI Character Platforms
Comments: Accepted to NDSS '26: The Network and Distributed System Security Symposium 2026
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)
[107]  arXiv:2512.01233 [pdf, ps, other]
Title: CTF Archive: Capture, Curate, Learn Forever
Subjects: Cryptography and Security (cs.CR)
[108]  arXiv:2512.01185 [pdf, ps, other]
Title: DefenSee: Dissecting Threat from Sight and Text - A Multi-View Defensive Pipeline for Multi-modal Jailbreaks
Subjects: Cryptography and Security (cs.CR)
[109]  arXiv:2512.01164 [pdf, ps, other]
Title: Reverse Engineering and Control-Aware Security Analysis of the ArduPilot UAV Framework
Subjects: Cryptography and Security (cs.CR); Systems and Control (eess.SY)
[110]  arXiv:2512.01115 [pdf, ps, other]
Title: Sliced Rényi Pufferfish Privacy: Directional Additive Noise Mechanism and Private Learning with Gradient Clipping
Subjects: Cryptography and Security (cs.CR)
[111]  arXiv:2512.00966 [pdf, ps, other]
Title: Mitigating Indirect Prompt Injection via Instruction-Following Intent Analysis
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[112]  arXiv:2512.00857 [pdf, ps, other]
Title: Hesperus is Phosphorus: Mapping Threat Actor Naming Taxonomies at Scale
Subjects: Cryptography and Security (cs.CR)
[113]  arXiv:2512.00833 [pdf, ps, other]
Title: Logic Encryption: This Time for Real
Subjects: Cryptography and Security (cs.CR); Hardware Architecture (cs.AR)
[114]  arXiv:2512.00804 [pdf, ps, other]
Title: Bias Injection Attacks on RAG Databases and Sanitization Defenses
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Databases (cs.DB)
[115]  arXiv:2512.00741 [pdf, ps, other]
Title: MASCOT: Analyzing Malware Evolution Through A Well-Curated Source Code Dataset
Comments: 11 pages, 6 figures, conference paper; submitted to IEEE BigData 2025 CyberHunt workshop
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[116]  arXiv:2512.00713 [pdf, ps, other]
Title: Concept-Guided Backdoor Attack on Vision Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[117]  arXiv:2512.00645 [pdf, ps, other]
Title: Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Comments: Accepted at EAI International Conference on Digital Forensics & Cyber Crime 2025
Subjects: Cryptography and Security (cs.CR); Databases (cs.DB)
[118]  arXiv:2512.00635 [pdf, ps, other]
Title: Extended Abstract: Synthesizable Low-overhead Circuit-level Countermeasures and Pro-Active Detection Techniques for Power and EM SCA
Authors: Archisman Ghosh
Comments: This extended abstract is archived for educational purposes as an example for different PhD forum competitions. Total page is 3
Subjects: Cryptography and Security (cs.CR)
[119]  arXiv:2512.00591 [pdf, ps, other]
Title: TrojanLoC: LLM-based Framework for RTL Trojan Localization
Subjects: Cryptography and Security (cs.CR)
[120]  arXiv:2512.00480 [pdf, ps, other]
Title: A Unified Framework for Constructing Information-Theoretic Private Information Retrieval
Authors: Liang Feng Zhang
Comments: 22 pages
Journal-ref: Pragmatic Cybersecurity 2025, 1 (1), 3
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT)
[121]  arXiv:2512.00436 [pdf, ps, other]
Title: RECTor: Robust and Efficient Correlation Attack on Tor
Comments: 8 pages, 4 figures, 2 tables
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG); Networking and Internet Architecture (cs.NI)
[122]  arXiv:2512.00414 [pdf, ps, other]
Title: BEACON: Automatic Container Policy Generation using Environment-aware Dynamic Analysis
Subjects: Cryptography and Security (cs.CR)
[123]  arXiv:2512.00412 [pdf, ps, other]
Title: Red Teaming Large Reasoning Models
Comments: 30 pages, 9 figures
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[124]  arXiv:2512.00377 [pdf, ps, other]
Title: Measuring Memecoin Fragility
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)
[125]  arXiv:2512.00142 [pdf, ps, other]
Title: DeFi TrustBoost: Blockchain and AI for Trustworthy Decentralized Financial Decisions
Comments: 19 pages
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computational Finance (q-fin.CP); General Finance (q-fin.GN)
[126]  arXiv:2512.00136 [pdf, ps, other]
Title: An Empirical Study on the Security Vulnerabilities of GPTs
Subjects: Cryptography and Security (cs.CR); Software Engineering (cs.SE)
[127]  arXiv:2512.00119 [pdf, ps, other]
Title: NetDeTox: Adversarial and Efficient Evasion of Hardware-Security GNNs via RL-LLM Orchestration
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[128]  arXiv:2512.00110 [pdf, ps, other]
Title: Quantum-Adversary-Resilient Evidence Structures and Migration Strategies for Regulated AI Audit Trails
Authors: Leo Kao
Comments: 15 pages, 1 table. Technical report for regulated AI audit trails with quantum-adversary security definitions and migration patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[129]  arXiv:2512.00098 [pdf, ps, other]
Title: Guarding Against Malicious Biased Threats (GAMBiT): Experimental Design of Cognitive Sensors and Triggers with Behavioral Impact Analysis
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT)
[130]  arXiv:2512.00094 [pdf, ps, other]
Title: HMARK: Radioactive Multi-Bit Semantic-Latent Watermarking for Diffusion Models
Subjects: Cryptography and Security (cs.CR); Computer Vision and Pattern Recognition (cs.CV)
[131]  arXiv:2512.01974 (cross-list from eess.SP) [pdf, ps, other]
Title: The Equivalence of Fast Algorithms for Convolution, Parallel FIR Filters, Polynomial Modular Multiplication, and Pointwise Multiplication in DFT/NTT Domain
Authors: Keshab K. Parhi
Comments: Proc. 2025 Asilomar conference on Signals, Systems, and Computers
Subjects: Signal Processing (eess.SP); Cryptography and Security (cs.CR)
[132]  arXiv:2512.01396 (cross-list from cs.SE) [pdf, ps, other]
Title: BackportBench: A Multilingual Benchmark for Automated Backporting of Patches
Comments: Under review
Subjects: Software Engineering (cs.SE); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[133]  arXiv:2512.00734 (cross-list from math.ST) [pdf, ps, other]
Title: Infinitely divisible privacy and beyond I: resolution of the $s^2=2k$ conjecture
Comments: Comments welcome. Abstract shortened based on arxiv requirement
Subjects: Statistics Theory (math.ST); Cryptography and Security (cs.CR); Information Theory (cs.IT); Probability (math.PR); Machine Learning (stat.ML)
[134]  arXiv:2512.00699 (cross-list from quant-ph) [pdf, ps, other]
Title: DyLoC: A Dual-Layer Architecture for Secure and Trainable Quantum Machine Learning Under Polynomial-DLA constraint
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
[135]  arXiv:2512.00595 (cross-list from cs.DC) [pdf, ps, other]
Title: IslandRun: Privacy-Aware Multi-Objective Orchestration for Distributed AI Inference
Comments: 15 pages, 3 figures, 2 tables
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[136]  arXiv:2512.00434 (cross-list from cs.LG) [pdf, ps, other]
Title: Privacy-Preserving Generative Modeling and Clinical Validation of Longitudinal Health Records for Chronic Disease
Comments: To appear in Proceedings of Machine Learning Research Volume 297 - Proceedings of ML4H 2025
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[137]  arXiv:2512.00272 (cross-list from cs.LG) [pdf, ps, other]
Title: Teleportation-Based Defenses for Privacy in Approximate Machine Unlearning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[138]  arXiv:2512.00251 (cross-list from cs.LG) [pdf, ps, other]
Title: SD-CGAN: Conditional Sinkhorn Divergence GAN for DDoS Anomaly Detection in IoT Networks
Comments: 7 pages, 6 figures, camera-ready version accepted for presentation at IEEE ICNC 2026
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[139]  arXiv:2512.00218 (cross-list from cs.AI) [pdf, ps, other]
Title: Reasoning Under Pressure: How do Training Incentives Influence Chain-of-Thought Monitorability?
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)

Mon, 1 Dec 2025

[140]  arXiv:2511.23408 [pdf, ps, other]
Title: Evaluating LLMs for One-Shot Patching of Real and Artificial Vulnerabilities
Comments: Pre-print - Extended version of the poster paper accepted at the 41st ACM/SIGAPP Symposium on Applied Computing (SAC) Smarter Engineering-Building AI and Building with AI (SEAI) 2026
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Software Engineering (cs.SE)
[141]  arXiv:2511.23393 [pdf, ps, other]
Title: FedSGT: Exact Federated Unlearning via Sequential Group-based Training
Subjects: Cryptography and Security (cs.CR)
[142]  arXiv:2511.23252 [pdf, ps, other]
Title: One-Shot Secure Aggregation: A Hybrid Cryptographic Protocol for Private Federated Learning in IoT
Comments: 11 pages, 6 figures. Accepted at The 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA 2025)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[143]  arXiv:2511.23200 [pdf, ps, other]
Title: Quantifying the Privacy-Utility Trade-off in GPS-based Daily Stress Recognition using Semantic Features
Subjects: Cryptography and Security (cs.CR); Human-Computer Interaction (cs.HC)
[144]  arXiv:2511.23198 [pdf, ps, other]
Title: Clustering Malware at Scale: A First Full-Benchmark Study
Comments: pre-print of the paper (i.e. "submitted manuscript" version); small updates to the tables, figures, and text were made in order to report the correct results on Ember
Journal-ref: ARES 2025. Lecture Notes in Computer Science vol 15993. pp 231-251
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[145]  arXiv:2511.23183 [pdf, ps, other]
Title: Identification of Malicious Posts on the Dark Web Using Supervised Machine Learning
Comments: Manuscript under review (SN Computer Science)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[146]  arXiv:2511.23026 [pdf, ps, other]
Title: A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks
Authors: Kassem Kallas
Comments: My PhD Thesis in Information Engineering and Sciences defended at University of Siena in Italy in 2017 under the supervision of Professor Mauro Barni
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)
[147]  arXiv:2511.22791 [pdf, ps, other]
Title: An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks
Comments: This paper has been accepted for publication in the Proceedings of the 44th AIAA/IEEE Digital Avionics Systems Conference (DASC) 2025, where it received the Best Paper of Session Award
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[148]  arXiv:2511.22788 [pdf, ps, other]
Title: PRISM: Privacy-Aware Routing for Adaptive Cloud-Edge LLM Inference via Semantic Sketch Collaboration
Comments: Accepted to AAAI 2026. This is the arXiv preprint version
Subjects: Cryptography and Security (cs.CR); Computation and Language (cs.CL)
[149]  arXiv:2511.22700 [pdf, ps, other]
Title: Ghosting Your LLM: Without The Knowledge of Your Gradient and Data
Authors: Abeer Matar A. Almalky (1), Ziyan Wang (2), Mohaiminul Al Nahian (1), Li Yang (2), Adnan Siraj Rakin (1) ((1) Binghamton University, (2) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[150]  arXiv:2511.22681 [pdf, ps, other]
Title: CacheTrap: Injecting Trojans in LLMs without Leaving any Traces in Inputs or Weights
Authors: Mohaiminul Al Nahian (1), Abeer Matar A. Almalky (1), Gamana Aragonda (2), Ranyang Zhou (2), Sabbir Ahmed (1), Dmitry Ponomarev (1), Li Yang (3), Shaahin Angizi (2), Adnan Siraj Rakin (1) ((1) SUNY Binghamton, (2) New Jersey Institute of Technology, (3) UNC Charlotte)
Subjects: Cryptography and Security (cs.CR)
[151]  arXiv:2511.22441 [pdf, ps, other]
Title: GEO-Detective: Unveiling Location Privacy Risks in Images with LLM Agents
Comments: 15 pages with 7 figures and 12 tables
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[152]  arXiv:2511.22434 [pdf, ps, other]
Title: FastFHE: Packing-Scalable and Depthwise-Separable CNN Inference Over FHE
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[153]  arXiv:2511.22416 [pdf, ps, other]
Title: Extending Quantum-Safe Communications to Real-World Networks: An Adaptive Security Framework
Subjects: Cryptography and Security (cs.CR)
[154]  arXiv:2511.22415 [pdf, ps, other]
Title: Exposing Vulnerabilities in RL: A Novel Stealthy Backdoor Attack through Reward Poisoning
Comments: Workshop on Safe and Robust Robot Learning for Operation in the Real World at CoRL 2025
Subjects: Cryptography and Security (cs.CR)
[155]  arXiv:2511.22340 [pdf, ps, other]
Title: Keyless Entry: Breaking and Entering eMMC RPMB with EMFI
Journal-ref: WiSec 2024: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Subjects: Cryptography and Security (cs.CR)
[156]  arXiv:2511.22317 [pdf, ps, other]
Title: Enhancing the Security of Rollup Sequencers using Decentrally Attested TEEs
Comments: This paper is under review at IEEE Transactions on Emerging Topics in Computing
Subjects: Cryptography and Security (cs.CR)
[157]  arXiv:2511.22259 [pdf, ps, other]
Title: Silence Speaks Volumes: A New Paradigm for Covert Communication via History Timing Patterns
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[158]  arXiv:2511.22215 [pdf, ps, other]
Title: Real-PGDN: A Two-level Classification Method for Full-Process Recognition of Newly Registered Pornographic and Gambling Domain Names
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[159]  arXiv:2511.22189 [pdf, ps, other]
Title: Department-Specific Security Awareness Campaigns: A Cross-Organizational Study of HR and Accounting
Subjects: Cryptography and Security (cs.CR)
[160]  arXiv:2511.22180 [pdf, ps, other]
Title: Personalized 3D Spatiotemporal Trajectory Privacy Protection with Differential and Distortion Geo-Perturbation
Subjects: Cryptography and Security (cs.CR)
[161]  arXiv:2511.22117 [pdf, ps, other]
Title: Privacy-preserving formal concept analysis: A homomorphic encryption-based concept construction
Subjects: Cryptography and Security (cs.CR); Computational Complexity (cs.CC)
[162]  arXiv:2511.22095 [pdf, ps, other]
Title: Binary-30K: A Heterogeneous Dataset for Deep Learning in Binary Analysis and Malware Detection
Comments: 35 pages, 7 figures, 11 tables, 4 appendices. Dataset available at this https URL
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[163]  arXiv:2511.22047 [pdf, ps, other]
Title: Evaluating the Robustness of Large Language Model Safety Guardrails Against Adversarial Attacks
Authors: Richard J. Young
Comments: 21 pages, 9 figures, 6 tables
Subjects: Cryptography and Security (cs.CR)
[164]  arXiv:2511.22044 [pdf, ps, other]
Title: Distillability of LLM Security Logic: Predicting Attack Success Rate of Outline Filling Attack via Ranking Regression
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
[165]  arXiv:2511.22017 [pdf, ps, other]
Title: POLARIS: Cross-Domain Access Control via Verifiable Identity and Policy-Based Authorization
Subjects: Cryptography and Security (cs.CR)
[166]  arXiv:2511.21999 [pdf, ps, other]
Title: GECKO: Securing Digital Assets Through(out) the Physical World (Extended Technical Report)
Subjects: Cryptography and Security (cs.CR)
[167]  arXiv:2511.21901 [pdf, ps, other]
Title: Standardized Threat Taxonomy for AI Security, Governance, and Regulatory Compliance
Authors: Hernan Huwyler
Comments: 10 pages, LaTeX. Preprint available on Zenodo
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Risk Management (q-fin.RM)
[168]  arXiv:2511.21804 [pdf, ps, other]
Title: Beyond Membership: Limitations of Add/Remove Adjacency in Differential Privacy
Comments: 17 pages, 11 figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[169]  arXiv:2511.21803 [pdf, ps, other]
Title: Cross-Layer Detection of Wireless Misbehavior Using 5G RAN Telemetry and Operational Metadata
Subjects: Cryptography and Security (cs.CR)
[170]  arXiv:2511.21795 [pdf, ps, other]
Title: Advanced Data Collection Techniques in Cloud Security: A Multi-Modal Deep Learning Autoencoder Approach
Comments: 13 pages
Subjects: Cryptography and Security (cs.CR)
[171]  arXiv:2511.21768 [pdf, ps, other]
Title: Categorical Framework for Quantum-Resistant Zero-Trust AI Security
Subjects: Cryptography and Security (cs.CR); Category Theory (math.CT); Quantum Physics (quant-ph)
[172]  arXiv:2511.21764 [pdf, ps, other]
Title: Adaptive Detection of Polymorphic Malware: Leveraging Mutation Engines and YARA Rules for Enhanced Security
Comments: 11 pages, 4 figures, 4 tables, 2 snapshots. Author Chinmay Prawah Pant contributed to proofreading, presentation improvements, and organizational support; core research, methodology, and experimentation were conducted by the main authors
Subjects: Cryptography and Security (cs.CR)
[173]  arXiv:2511.21758 [pdf, ps, other]
Title: A Longitudinal Measurement of Privacy Policy Evolution for Large Language Models
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)
[174]  arXiv:2511.23406 (cross-list from cs.IT) [pdf, ps, other]
Title: Quantum Private Distributed Matrix Multiplication With Degree Tables
Comments: The abstract here is trimmed due to the space limitations in the submission process
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP); Quantum Physics (quant-ph)
[175]  arXiv:2511.23278 (cross-list from cs.NI) [pdf, ps, other]
Title: RetryGuard: Preventing Self-Inflicted Retry Storms in Cloud Microservices Applications
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
[176]  arXiv:2511.22924 (cross-list from cs.MA) [pdf, ps, other]
Title: AgentShield: Make MAS more secure and efficient
Subjects: Multiagent Systems (cs.MA); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[177]  arXiv:2511.22859 (cross-list from eess.IV) [pdf, ps, other]
Title: TokCom-UEP: Semantic Importance-Matched Unequal Error Protection for Resilient Image Transmission
Subjects: Image and Video Processing (eess.IV); Cryptography and Security (cs.CR)
[178]  arXiv:2511.22359 (cross-list from cs.SE) [pdf, ps, other]
Title: UniBOM -- A Unified SBOM Analysis and Visualisation Tool for IoT Systems and Beyond
Comments: This paper has been accepted at the ACM 15th International Conference on the Internet of Things (ACM IoT 2025)
Subjects: Software Engineering (cs.SE); Cryptography and Security (cs.CR)
[179]  arXiv:2511.22147 (cross-list from cs.CV) [pdf, ps, other]
Title: RemedyGS: Defend 3D Gaussian Splatting against Computation Cost Attacks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[180]  arXiv:2511.21990 (cross-list from cs.LG) [pdf, ps, other]
Title: A Safety and Security Framework for Real-World Agentic Systems
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[181]  arXiv:2511.21842 (cross-list from cs.LG) [pdf, ps, other]
Title: Unsupervised Anomaly Detection for Smart IoT Devices: Performance and Resource Comparison
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR)
[182]  arXiv:2511.21757 (cross-list from cs.CY) [pdf, ps, other]
Title: Medical Malice: A Dataset for Context-Aware Safety in Healthcare LLMs
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Cryptography and Security (cs.CR)
[ total of 182 entries: 1-250 | 101-182 ]
[ showing up to 250 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, new, 2512, contact, help  (Access key information)