
2025-10-21 13:08:03
MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs
Ruyi Ding, Tianhong Xu, Xinyi Shen, Aidong Adam Ding, Yunsi Fei
https://arxiv.org/abs/2508.15036
On the Compromise Between Performance and Efficiency in RIS-aided Communication Systems
P. H. C. de Souza (National Institute of Telecommunications - Inatel), M. Khazaee (National Institute of Telecommunications - Inatel), L. L. Mendes (National Institute of Telecommunications - Inatel)
https://arxiv.org/abs/2508.15599
3/3 This pattern is particularly tough when the reasons you’re bored with what you have to do are out of your control.
We can’t always choose to only do work that’s fun, or only do it in fun ways.
We might have to compromise with others or be handed down tasks that we hate but have to do to make money and live.
And then add to that having a condition like #ADHD which makes people like me bored on a chronic basis, sometimes for no reason at all.
It’s like a built-in sabotage switch in my brain.
I don’t know what to do about it.
LGMSNet: Thinning a medical image segmentation model via dual-level multiscale fusion
Chengqi Dong, Fenghe Tang, Rongge Mao, Xinpei Gao, S. Kevin Zhou
https://arxiv.org/abs/2508.15476
Medical priority fusion: achieving dual optimization of sensitivity and interpretability in nipt anomaly detection
Xiuqi Ge, Zhibo Yao, Yaosong Du
https://arxiv.org/abs/2509.17924
Another airline hit by a criminal extortion group, this time Clop.
Regional airline Envoy Air confirms Oracle E-Business Suite compromise
https://therecord.media/regional-airline-envoy-oracle
Hands-on with Boba 3, Meta's prototype PC VR headset with a form factor similar to the Quest 3, featuring an ultrawide field of view of 180° by 120° (David Heaney/UploadVR)
https://www.uploadvr.com/meta-boba-3-prototype-hands-on-ultra-…
Hierarchical Retrieval: The Geometry and a Pretrain-Finetune Recipe
Chong You, Rajesh Jayaram, Ananda Theertha Suresh, Robin Nittka, Felix Yu, Sanjiv Kumar
https://arxiv.org/abs/2509.16411
Over 1,200 arrested in Africa-wide cybercrime crackdown, Interpol says https://therecord.media/africa-interpol-cybercrime-crackdown
"While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful #EntraID #vulnerability that I will probably ever find. This vulnerability could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deploymen…
Agent's Take: A unique compromise that could end the Commanders-Terry McLaurin contract dispute
https://www.cbssports.com/nfl/news/agents-
Clapper allegedly pushed to 'compromise' 'normal' steps to rush 2017 ICA, despite concerns from NSA director (Brooke Singman/Fox News)
https://www.foxnews.com/politics/clapper-pushed-compromise-normal-steps-rush-2017-ica-despite-concerns-from-nsa-director
http://www.memeorandum.com/250813/p91#a250813p91
Future-Proofing Cloud Security Against Quantum Attacks: Risk, Transition, and Mitigation Strategies
Yaser Baseri, Abdelhakim Hafid, Arash Habibi Lashkari
https://arxiv.org/abs/2509.15653
An Open-Source HW-SW Co-Development Framework Enabling Efficient Multi-Accelerator Systems
Ryan Albert Antonio, Joren Dumoulin, Xiaoling Yi, Josse Van Delm, Yunhao Deng, Guilherme Paim, Marian Verhelst
https://arxiv.org/abs/2508.14582
WELL.
We have a newly installed @… version on an old #EndoOf10 laptop.
All user files have been moved across (will require some organisation still, and that alone will be a shock to a GenZ used to just dumping stuff on the cloud - honestly the desktop looked like my parents... 😱 ).
Most important programs are there (I had to explain difference between program and app along the way too).
And overall it's been a pretty positive learning experience for both of us. I have had to compromise on a few things and teenager has a few programs installed that I'd rather not - but let's see this as a gateway out of #BigTech if at all possible...
There will be a few more follow up points I suspect but thanks all for your friendly encouragement and helpful hints so far
#MastodonRocks
15/n
Interesting,
"One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens"
https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/
I'll gonna take some time today to personalize the message and send out emails from my own account to hopefully ditch filtering on the target side and make my voice heard. Allowing chat control does not only put privacy and democracy in danger. At times of constant digital attacks from rogue states like Russia, the US, North Korea and China etc. it should be obvious that having weak encryption and standard backdoor access to secure communications channels is an invitation for any malici…
Replaced article(s) found for cond-mat.mes-hall. https://arxiv.org/list/cond-mat.mes-hall/new
[1/1]:
- Compromise-Free Scaling of Qubit Speed and Coherence
Miguel J. Carballido, et al.
Two Sides to Every Story: Exploring Hybrid Design Teams' Perceptions of Psychological Safety on Slack
Marjan Naghshbandi, Sharon Ferguson, Alison Olechowski
https://arxiv.org/abs/2508.11788
RulER: Automated Rule-Based Semantic Error Localization and Repair for Code Translation
Shuo Jin, Songqiang Chen, Xiaoyuan Xie, Shing-Chi Cheung
https://arxiv.org/abs/2509.14829
French Prime Minister
Sébastien Lecornu has spoken to reporters,
about an hour after announcing his resignation.
“I was ready to compromise,
but each political party wanted the other political party to adopt its entire program,”
he said from the courtyard of Matignon Palace, the prime minister’s headquarters
European "socialism" is a compromise wherein the population gets services and, in exchange, the rich are allowed to continue to exist. This compromise developed to save capitalism from the threat of the working class just rising up and just doing it all themselves. Revolutions, it turns out, can be dangerous and may be subverted. It's generally safer, so Europe's working class decided, to accept some exploitation in exchange for not taking that chance.
The the strategy of "point guns at everyone until they comply" was a sustainable strategy, all of Europe would still be absolute monarchies, feudalism would still be the dominant economic system globally, and England would still control most of the land on Earth. Recognizing that this *isn't* the state of the world should give some clues as to how well Yarvin's ideas continue will play out in the real world.
#USPol
Study: 63% of Consumers Have a More Positive Perception of Brands That Use Sustainable Packaging https://vegconomist.com/packaging/study-consumers-associate-sustainable-packaging-positive-brand-perception/
Hackers reportedly compromise Canadian House of Commons through Microsoft vulnerability https://therecord.media/hackers-compromise-canada-house-of-commons
Mike Johnson raises fresh doubts about an Obamacare compromise (Meredith Lee Hill/Politico)
https://www.politico.com/live-updates/2025/10/10/congress/mike-johnson-raises-fresh-doubts-about-an-obamacare-compromise-00601984
http://www.memeorandum.com/251010/p141#a251010p141
FedUP: Efficient Pruning-based Federated Unlearning for Model Poisoning Attacks
Nicol\`o Romandini, Cristian Borcea, Rebecca Montanari, Luca Foschini
https://arxiv.org/abs/2508.13853
InfiniteTalk: Audio-driven Video Generation for Sparse-Frame Video Dubbing
Shaoshu Yang, Zhe Kong, Feng Gao, Meng Cheng, Xiangyu Liu, Yong Zhang, Zhuoliang Kang, Wenhan Luo, Xunliang Cai, Ran He, Xiaoming Wei
https://arxiv.org/abs/2508.14033
The LLM Already Knows: Estimating LLM-Perceived Question Difficulty via Hidden Representations
Yubo Zhu, Dongrui Liu, Zecheng Lin, Wei Tong, Sheng Zhong, Jing Shao
https://arxiv.org/abs/2509.12886
Finite-time consensus in a compromise process
P. L. Krapivsky, A. Yu. Plakhov
https://arxiv.org/abs/2509.01024 https://arxiv.org/pdf/2509.01024
"Yes, years of compromise and disappointment have added depth to my acting."
-Rufus Sewell
#acting #coaching #inspiration
PerchMobi^3: A Multi-Modal Robot with Power-Reuse Quad-Fan Mechanism for Air-Ground-Wall Locomotion
Yikai Chen, Zhi Zheng, Jin Wang, Bingye He, Xiangyu Xu, Jialu Zhang, Huan Yu, Guodong Lu
https://arxiv.org/abs/2509.12620
Citation accuracy, citation noise, and citation bias: A foundation of citation analysis
Lutz Bornmann, Christian Leibel
https://arxiv.org/abs/2508.12735 https://
Vulnerable Agent Identification in Large-Scale Multi-Agent Reinforcement Learning
Simin Li, Zheng Yuwei, Zihao Mao, Linhao Wang, Ruixiao Xu, Chengdong Ma, Xin Yu, Yuqing Ma, Qi Dou, Xin Wang, Jie Luo, Bo An, Yaodong Yang, Weifeng Lv, Xianglong Liu
https://arxiv.org/abs/2509.15103
'Ukraine will never be forced into compromise. We need a just peace' — Zelensky's Independence Day address: https://benborges.xyz/2025/08/24/ukraine-will-never-be-forced.html
Smart that Zelensky quickly visits Trump. If i was Ukraine i would make the compromise of giving up NATO memberschip but be allowed to quickly join the EU. With the current developments, the guarantuees in the EU treaty around security, NATO membership is not that crucial.
#geopolitics #ukraine
My take on the trend toward 90 credit Bachelor degrees in US higher education, and a few thoughts about the benefits and drawbacks, and about the compromise solution of the Distance Education Accrediting Commission for 3-year programs.
This started out as my response to DEAC's request for comments on their proposal, and I realized I was three fourths of the way to a short essay, so I went ahead and finished it.
Pruning Long Chain-of-Thought of Large Reasoning Models via Small-Scale Preference Optimization
Bin Hong, Jiayu Liu, Zhenya Huang, Kai Zhang, Mengdi Zhang
https://arxiv.org/abs/2508.10164
SF Supervisor Matt Dorsey was one of 15 BCDC Commissioners who voted to take away weekday access to the Richmond-San Rafael Bridge bike path.
Dorsey said cyclists need to learn to compromise more. So much for his bragging about using bikeshare 🚮
https://richmond…
Weekend Reads
* Cloud flow logs for security
https://www.sei.cmu.edu/blog/enhancing-security-with-cloud-flow-logs/
* Supply chain compromises retrospective
Nikhil Banerjee - "Raga Komala Rishab Asawari / Raga Maluha Kalyan, Raga Mishra Gara" (1966)
"I do not compromise with anybody or anything else in the world. I do not care, I don’t care if anybody appreciates it or not; I don’t care. .... I want to really go beyond this materialistic world towards Space — there, no compromise. .... A musician must lift up the souls of the listeners, and take them towards Space.” - N.B.
LazyDrag: Enabling Stable Drag-Based Editing on Multi-Modal Diffusion Transformers via Explicit Correspondence
Zixin Yin, Xili Dai, Duomin Wang, Xianfang Zeng, Lionel M. Ni, Gang Yu, Heung-Yeung Shum
https://arxiv.org/abs/2509.12203
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 with New Scoring and Data Sources
Tadeu Freitas, Carlos Novo, In\^es Dutra, Jo\~ao Soares, Manuel Correia, Benham Shariati, Rolando Martins
https://arxiv.org/abs/2508.13364
No such thing as a quiet weekend in cybersecurity, so check out today's Metacurity for the infosec developments you might have missed since Friday, including
--Scattered LAPSUS$ Hunters claims theft of 1 billion Salesforce records,
--Game engine developer Unity urges users to patch a severe flaw,
--Hackers stole some Discord user data after a third-party compromise,
--US immigration dramatically expands its spying ability,
--Asahi reverts to pen and paper to …
A Non-Intrusive Framework for Deferred Integration of Cloud Patterns in Energy-Efficient Data-Sharing Pipelines
Sepideh Masoudi, Mark Edward Michael Daly, Jannis Kiesel, Stefan Tai
https://arxiv.org/abs/2510.12354
Sync-in · The open-source platform that keeps your data safe
Sync-in is your open-source platform to store, share, collaborate, and sync your files. Manage your data, freely, privately and with no compromise.
📑 https://sync-in.com
:mastodon: @…
Regional airline Envoy Air confirms Oracle E-Business Suite compromise https://therecord.media/regional-airline-envoy-oracle
MemorySim: An RTL-level, timing accurate simulator model for the Chisel ecosystem
Ansh Chaurasia
https://arxiv.org/abs/2508.12636 https://arxiv.org/pdf/250…
Routinely ignoring Dependabot requests pays off again, probably.
https://cyberplace.social/@GossiTheDog/115169390397282254
Robust Recovery and Control of Cyber-physical Discrete Event Systems under Actuator Attacks
Samuel Oliveira, Mostafa Tavakkoli Anbarani, Gregory Beal, Ilya Kovalenko, Marcelo Teixeira, Andr\'e B. Leal, R\^omulo Meira-G\'oes
https://arxiv.org/abs/2510.11405
Prompt Attacks Against LLM-Powered Assistants in Production Are Practical and Dangerous
#security #llm
https://arxiv.org/abs/2508.12175
Design and analysis of a set of discrete variable protocols for secure quantum communication
Arindam Dutta
https://arxiv.org/abs/2508.06380 https://arxiv.o…
A K-adaptability Approach to Proton Radiation Therapy Robust Treatment Planning
Zihang Qiu, Ali Ajdari, Mislav Bobi\'c, Thomas Bortfeld, Dick den Hertog, Jannis Kurtz, Hoyeon Lee
https://arxiv.org/abs/2508.07368
Involuntary Jailbreak
Yangyang Guo, Yangyan Li, Mohan Kankanhalli
https://arxiv.org/abs/2508.13246 https://arxiv.org/pdf/2508.13246
Ensembling Large Language Models for Code Vulnerability Detection: An Empirical Evaluation
Zhihong Sun, Jia Li, Yao Wan, Chuanyi Li, Hongyu Zhang, Zhi jin, Ge Li, Hong Liu, Chen Lyu, Songlin Hu
https://arxiv.org/abs/2509.12629
The Senate on Thursday night approved its $925 billion version of the
National Defense Authorization Act,
the annual must-pass Pentagon policy blueprint,
setting up what is expected to be a lengthy negotiation with the House to finalize the bill.
The legislation, deadlocked for weeks over various partisan disagreements,
advanced by a margin of 77 to 20 following amendment votes earlier in the evening.
Senate and House staff will next reconcile their bills…
GS-Verse: Mesh-based Gaussian Splatting for Physics-aware Interaction in Virtual Reality
Anastasiya Pechko, Piotr Borycki, Joanna Waczy\'nska, Daniel Barczyk, Agata Szyma\'nska, S{\l}awomir Tadeja, Przemys{\l}aw Spurek
https://arxiv.org/abs/2510.11878
The revolting, media-assisted tax on the mathematically-challenged rears its ugly head again.
Compelling the lower class to make the nation's biggest sucker bets with "it's fun!" & "if you don't play, you can't win" are an obnoxious compromise of ethics.
#powerball
Towards Reliable Generative AI-Driven Scaffolding: Reducing Hallucinations and Enhancing Quality in Self-Regulated Learning Support
Keyang Qian, Shiqi Liu, Tongguang Li, Mladen Rakovi\'c, Xinyu Li, Rui Guan, Inge Molenaar, Sadia Nawaz, Zachari Swiecki, Lixiang Yan, Dragan Ga\v{s}evi\'c
https://arxiv.org/abs/2508.05929
⚠ Russia wants to guarantee peace, but doesn't sign the agreement – is a compromise possible?#shorts: https://benborges.xyz/2025/08/24/russia-wants-to-guarantee-peace.html…
Quantitative In Vivo Cherenkov Luminescence Imaging and Dosimetry of Yttrium-86-NM600
Campbell Haasch, Malick Bio Idrissou, Sydney Jupitz, Aubrey Parks, Reinier Hernandez, Brian Pogue, Bryan Bednarz
https://arxiv.org/abs/2509.13533
Palo Alto confirms Salesloft Drift Integration was used to compromise Salesforce instances
https://unit42.paloaltonetworks.com/threat-brief-compromised-salesforce-instances/
To my way of thinking it is better to starve a mad dog than to feed it.
If this shutdown slows down the destruction being caused by the maga-klan then the hurt we will feel from the shutdown will be more than repaid by the retardation of our rapid descent into fascism, inflation, and international irrelevance.
"Yes, years of compromise and disappointment have added depth to my acting."
-Rufus Sewell
#acting #coaching #inspiration
Dense Video Understanding with Gated Residual Tokenization
Haichao Zhang, Wenhao Chai, Shwai He, Ang Li, Yun Fu
https://arxiv.org/abs/2509.14199 https://ar…
Gov. Gavin Newsom signs a bill that gives ride-hailing drivers in California the right to unionize while remaining classified as independent contractors (Associated Press)
https://apnews.com/article/lyft-uber-rideshare-driver-union-cali…
Invitation Is All You Need! Promptware Attacks Against LLM-Powered Assistants in Production Are Practical and Dangerous
Ben Nassi, Stav Cohen, Or Yair
https://arxiv.org/abs/2508.12175
Reduction of motion artifacts from photoplethysmography signals using learned convolutional sparse coding
Giulio Basso, Xi Long, Reinder Haakma, Rik Vullings
https://arxiv.org/abs/2508.10805
A top Social Security Administration official turned whistleblower
says members of the Trump administration’s Department of Government Efficiency (DOGE)
uploaded hundreds of millions of Social Security records to a vulnerable cloud server,
putting the personal information of most Americans at risk of compromise.
Charles Borges, the Social Security Administration’s chief data officer,
said in a newly released whistleblower complaint published Tuesday
that o…
BWCache: Accelerating Video Diffusion Transformers through Block-Wise Caching
Hanshuai Cui, Zhiqing Tang, Zhifei Xu, Zhi Yao, Wenyi Zeng, Weijia Jia
https://arxiv.org/abs/2509.13789
It's worth remembering that the civil war was a slave revolt:
#USPol
LinguaSim: Interactive Multi-Vehicle Testing Scenario Generation via Natural Language Instruction Based on Large Language Models
Qingyuan Shi, Qingwen Meng, Hao Cheng, Qing Xu, Jianqiang Wang
https://arxiv.org/abs/2510.08046
Never Compromise to Vulnerabilities: A Comprehensive Survey on AI Governance
Yuchu Jiang, Jian Zhao, Yuchen Yuan, Tianle Zhang, Yao Huang, Yanghao Zhang, Yan Wang, Yanshu Li, Xizhong Guo, Yusheng Zhao, Jun Zhang, Zhi Zhang, Xiaojian Lin, Yixiu Zou, Haoxuan Ma, Yuhu Shang, Yuzhi Hu, Keshu Cai, Ruochen Zhang, Boyuan Chen, Yilan Gao, Ziheng Jiao, Yi Qin, Shuangjun Du, Xiao Tong, Zhekun Liu, Yu Chen, Xuankun Rong, Rui Wang, Yejie Zheng, Zhaoxin Fan, Hongyuan Zhang, Pan Zhou, Lei Jin, Hao Z…
Anchoring Refusal Direction: Mitigating Safety Risks in Tuning via Projection Constraint
Yanrui Du, Fenglei Fan, Sendong Zhao, Jiawei Cao, Qika Lin, Kai He, Ting Liu, Bing Qin, Mengling Feng
https://arxiv.org/abs/2509.06795
Latent Policy Barrier: Learning Robust Visuomotor Policies by Staying In-Distribution
Zhanyi Sun, Shuran Song
https://arxiv.org/abs/2508.05941 https://arxi…
OBsmith: Testing JavaScript Obfuscator using LLM-powered sketching
Shan Jiang, Chenguang Zhu, Sarfraz Khurshid
https://arxiv.org/abs/2510.10066 https://arx…
Composable Score-based Graph Diffusion Model for Multi-Conditional Molecular Generation
Anjie Qiao, Zhen Wang, Chuan Chen, DeFu Lian, Enhong Chen
https://arxiv.org/abs/2509.09451
Detaining US citizen upon returning to US in attempt to compromise student information in a school system, claiming they have no Constitutional rights, is ice this week.
https://www.yahoo.com/news/videos/vermont-school-superintendent-detained-tri…
Navigating the Dual-Use Nature and Security Implications of Reconfigurable Intelligent Surfaces in Next-Generation Wireless Systems
Hetong Wang, Tiejun Lv, Yashuai Cao, Weicai Li, Jie Zeng, Pingmu Huang, Muhammad Khurram Khan
https://arxiv.org/abs/2510.11113
MoGU V2: Toward a Higher Pareto Frontier Between Model Usability and Security
Yanrui Du, Fenglei Fan, Sendong Zhao, Jiawei Cao, Ting Liu, Bing Qin
https://arxiv.org/abs/2509.06807
“ Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System”
#china
FBI warns of Scattered Spider and ShinyHunters attacks on Salesforce platforms https://therecord.media/fbi-warns-scattered-spider-salesforce
Poisoning Attacks on LLMs Require a Near-constant Number of Poison Samples
Alexandra Souly, Javier Rando, Ed Chapman, Xander Davies, Burak Hasircioglu, Ezzeldin Shereen, Carlos Mougan, Vasilios Mavroudis, Erik Jones, Chris Hicks, Nicholas Carlini, Yarin Gal, Robert Kirk
https://arxiv.org/abs/2510.07192…
Diffusion Transformers with Representation Autoencoders
Boyang Zheng, Nanye Ma, Shengbang Tong, Saining Xie
https://arxiv.org/abs/2510.11690 https://arxiv.…
SoK: How Sensor Attacks Disrupt Autonomous Vehicles: An End-to-end Analysis, Challenges, and Missed Threats
Qingzhao Zhang, Shaocheng Luo, Z. Morley Mao, Miroslav Pajic, Michael K. Reiter
https://arxiv.org/abs/2509.11120
CISA urges orgs to review software after ‘Shai-Hulud’ supply chain compromise https://therecord.media/cisa-urges-software-reviews-malicious-packages
Lightweight CNN-Based Wi-Fi Intrusion Detection Using 2D Traffic Representations
Rayed Suhail Ahmad, Rehan Ahmad, Quamar Niyaz
https://arxiv.org/abs/2510.11898 https://
A Structured Review of Underwater Object Detection Challenges and Solutions: From Traditional to Large Vision Language Models
Edwine Nabahirwa, Wei Song, Minghua Zhang, Yi Fang, Zhou Ni
https://arxiv.org/abs/2509.08490
TraceAegis: Securing LLM-Based Agents via Hierarchical and Behavioral Anomaly Detection
Jiahao Liu, Bonan Ruan, Xianglin Yang, Zhiwei Lin, Yan Liu, Yang Wang, Tao Wei, Zhenkai Liang
https://arxiv.org/abs/2510.11203
Effective Training Data Synthesis for Improving MLLM Chart Understanding
Yuwei Yang, Zeyu Zhang, Yunzhong Hou, Zhuowan Li, Gaowen Liu, Ali Payani, Yuan-Sen Ting, Liang Zheng
https://arxiv.org/abs/2508.06492
Designing with Deception: ML- and Covert Gate-Enhanced Camouflaging to Thwart IC Reverse Engineering
Junling Fan, David Koblah, Domenic Forte
https://arxiv.org/abs/2508.08462 ht…
Modern iOS Security Features -- A Deep Dive into SPTM, TXM, and Exclaves
Moritz Steffin, Jiska Classen
https://arxiv.org/abs/2510.09272 https://arxiv.org/p…
Membrane: A Cryptographic Access Control System for Data Lakes
Sam Kumar, Samyukta Yagati, Conor Power, David E. Culler, Raluca Ada Popa
https://arxiv.org/abs/2509.08740 https:/…
Stealth by Conformity: Evading Robust Aggregation through Adaptive Poisoning
Ryan McGaughey, Jesus Martinez del Rincon, Ihsen Alouani
https://arxiv.org/abs/2509.08746 https://…
Blockchain-Based Decentralized Domain Name System
Guang Yang, Peter Trinh, Alma Nkemla, Amuru Serikyaku, Edward Tatchim, Osman Sharaf
https://arxiv.org/abs/2508.05655 https://…
SilentLedger: Privacy-Preserving Auditing for Blockchains with Complete Non-Interactivity
Zihan Liu, Xiaohu Wang, Chao Lin, Minghui Xu, Debiao He, Xinyi Huang
https://arxiv.org/abs/2509.08722
GNN-enhanced Traffic Anomaly Detection for Next-Generation SDN-Enabled Consumer Electronics
Guan-Yan Yang, Farn Wang, Kuo-Hui Yeh
https://arxiv.org/abs/2510.07109 https://
A multi-layered embedded intrusion detection framework for programmable logic controllers
Rishabh Das. Aaron Werth, Tommy Morris
https://arxiv.org/abs/2510.07171 https://…
P2P: A Poison-to-Poison Remedy for Reliable Backdoor Defense in LLMs
Shuai Zhao, Xinyi Wu, Shiqian Zhao, Xiaobao Wu, Zhongliang Guo, Yanhao Jia, Anh Tuan Luu
https://arxiv.org/abs/2510.04503