
2025-09-03 08:39:53
Case Studies: Effective Approaches for Navigating Cross-Border Cloud Data Transfers Amid U.S. Government Privacy and Safety Concerns
Motunrayo Adebayo
https://arxiv.org/abs/2509.00006
Case Studies: Effective Approaches for Navigating Cross-Border Cloud Data Transfers Amid U.S. Government Privacy and Safety Concerns
Motunrayo Adebayo
https://arxiv.org/abs/2509.00006
BidenCash carding market domains seized in international operation
https://www.bleepingcomputer.com/news/security/bidencash-carding-market-domains-seized-in-international-operation/
Privacy, Informed Consent and the Demand for Anonymisation of Smart Meter Data
Saurab Chhachhi, Fei Teng
https://arxiv.org/abs/2509.00101 https://arxiv.org…
Coordinated Multi-BS SSB Beam Design for Enhanced Initial Access Coverage
Hakime BarghiZanjani, Bikshapathi Gouda, Antti T\"olli
https://arxiv.org/abs/2506.02760
Conversational LLMs Simplify Secure Clinical Data Access, Understanding, and Analysis
Rafi Al Attrach, Pedro Moreira, Rajna Fani, Renato Umeton, Leo Anthony Celi
https://arxiv.org/abs/2507.01053
From One-Dimensional Codes to Two-Dimensional Codes: A Universal Framework for the Bounded-Weight Constraint
Viet Hai Le, Thanh Phong Pham, Tuan Thanh Nguyen, Kui Cai, Kees A. Schouhamer Immink
https://arxiv.org/abs/2509.01240
Filing: credit reporting giant TransUnion discloses a data breach affecting 4.4M customers' personal info but claims "no credit information was accessed" (Zack Whittaker/TechCrunch)
https://techcrunch.com/2025/08/28/tran
Credit reporting giant TransUnion has disclosed a data breach
affecting more than 4.4 million customers’ personal information.
In a filing with Maine’s attorney general’s office on Thursday, TransUnion attributed the July 28 breach to unauthorized access of a third-party application storing customers’ personal data for its U.S. consumer support operations.
TransUnion claimed “no credit information was accessed,” but provided no immediate evidence for its claim.
The d…
Quantum state reconstruction with variational quantum circuit
Shabnam Jabeen, Dmytro Kurdydyk, Aadi Palnitkar, Mihir Talati, Jeffrey Yan, Jinghong Yang
https://arxiv.org/abs/2507.01246
On Performance of IoT Networks with Coordinated NOMA Transmission: Covert Monitoring and Information Decoding
Thai-Hoc Vu, Anh-Tu Le, Ngo Hoang Tu, Tan N. Nguyen, Miroslav Voznak
https://arxiv.org/abs/2509.01935
Russia jails man for 16 years over pro-Ukraine cyberattacks on critical infrastructure https://therecord.media/russia-jails-man-over-pro-ukraine-cyberattacks
On the Complexity of Knapsack under Explorable Uncertainty: Hardness and Algorithms
Jens Schl\"oter
https://arxiv.org/abs/2507.02657 https://
ARMOUR US: Android Runtime Zero-permission Sensor Usage Monitoring from User Space
Yan Long, Jiancong Cui, Yuqing Yang, Tobias Alam, Zhiqiang Lin, Kevin Fu
https://arxiv.org/abs/2507.02177
Synthetic generation of online social networks through homophily
Alejandro Buitrago L\'opez, Javier Pastor-Galindo, Jos\'e A. Ruip\'erez-Valiente
https://arxiv.org/abs/2509.02762
maria goes NIFTy: Gaussian Process-Based Reconstruction and Denoising of Simulated (Sub-)Millimetre Single-Dish Telescope Data
Jonas W\"urzinger, Joshiwa van Marrewijk, Thomas W. Morris, Richard Fuchs, Tony Mroczkowski, Lukas Heinrich
https://arxiv.org/abs/2509.01600
Trump wins as judge allows DOGE to access 'sensitive' info
https://lawandcrime.com/high-profile/still-cannot-step-in-trump-admin-scores-victory-as-judge-denies-labor-unions-injunction-and-allows-doge-to-access-stockpile-of-extremely-sensitive-information/
DICOM De-Identification via Hybrid AI and Rule-Based Framework for Scalable, Uncertainty-Aware Redaction
Kyle Naddeo, Nikolas Koutsoubis, Rahul Krish, Ghulam Rasool, Nidhal Bouaynaya, Tony OSullivan, Raj Krish
https://arxiv.org/abs/2507.23736
Positioning AI Tools to Support Online Harm Reduction Practice: Applications and Design Directions
Kaixuan Wang, Jason T. Jacques, Chenxin Diao
https://arxiv.org/abs/2506.22941
DeepSieve: Information Sieving via LLM-as-a-Knowledge-Router
Minghao Guo, Qingcheng Zeng, Xujiang Zhao, Yanchi Liu, Wenchao Yu, Mengnan Du, Haifeng Chen, Wei Cheng
https://arxiv.org/abs/2507.22050
Enhancing Manufacturing Knowledge Access with LLMs and Context-aware Prompting
Sebastian Monka, Irlan Grangel-Gonz\'alez, Stefan Schmid, Lavdim Halilaj, Marc Rickart, Oliver Rudolph, Rui Dias
https://arxiv.org/abs/2507.22619
Ukrainian hack uncovers 'thousands of files' proving Russia's mass abduction of children, intelligence claims: https://benborges.xyz/2025/07/30/ukrainian-hack-uncovers-thousands-of.html
In its white paper ‘Beyond AI & Copyright’, @… emphasises two structural risks of AI-supported access to knowledge:
1. the concentration of control over knowledge in the hands of a few powerful actors
2. the erosion of the institutions and economic foundations of human information production.
To preserve digital knowledge communities, he calls for …
Multi-dimensional frequency-bin entanglement-based quantum key distribution network
George Claudiu Crisan, Antoine Henry, Dario Alessandro Fioretto, Juan Rafael Alvarez, St\'ephan Monfray, Fr\'ed\'eric Boeuf, Laurent Vivien, Eric Cassan, Carlos Alonso-Ramos, Nadia Belabas
https://arxiv.org/abs/2507.00972
"Microsoft can't protect French data from US government access"
#microsoft
This https://arxiv.org/abs/2502.19030 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csSI_…
A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges
Sudhanshu Sekhar Tripathy, Bichitrananda Behera
https://arxiv.org/abs/2506.02438
TRIM: A Self-Supervised Video Summarization Framework Maximizing Temporal Relative Information and Representativeness
Pritam Mishra, Coloma Ballester, Dimosthenis Karatzas
https://arxiv.org/abs/2506.20588
Enhanced Velocity-Adaptive Scheme: Joint Fair Access and Age of Information Optimization in Vehicular Networks
Xiao Xu, Qiong Wu, Pingyi Fan, Kezhi Wang, Nan Cheng, Wen Chen, Khaled B. Letaief
https://arxiv.org/abs/2507.18328
Derivation of CRB and Refined SINR Expressions for OTFS-RSMA LEO ISAC Systems
Bruno Felipe Costa, Taufik Abr\~ao
https://arxiv.org/abs/2506.02771 https://
Counterfactual Voting Adjustment for Quality Assessment and Fairer Voting in Online Platforms with Helpfulness Evaluation
Chang Liu, Yixin Wang, Moontae Lee
https://arxiv.org/abs/2506.21362
"DOGE secured the power to view records that contain competitors’ trade secrets, nonpublic details about government contracts, and sensitive regulatory actions or other information."
'Vulnerable': New alarm as Musk's 'God tier access' to damaging data revealed - Raw Story
https://www.rawstory.com/musk-private-data/
Cell-Free Massive MIMO SWIPT with Beyond Diagonal Reconfigurable Intelligent Surfaces
Duc Thien Hua, Mohammadali Mohammadi, Hien Quoc Ngo, Michail Matthaiou
https://arxiv.org/abs/2507.23702
Safe and Efficient Data-driven Connected Cruise Control
Haosong Xiao, Chaozhe R. He
https://arxiv.org/abs/2507.22227 https://arxiv.org/pdf/2507.22227
NGOs urge Zelensky to veto bill restricting access to real estate registers: https://benborges.xyz/2025/08/26/ngos-urge-zelensky-to-veto.html
Morae: Proactively Pausing UI Agents for User Choices
Yi-Hao Peng, Dingzeyu Li, Jeffrey P. Bigham, Amy Pavel
https://arxiv.org/abs/2508.21456 https://arxiv…
Model fine-tuning without compromising information access controls.
"Copilot Tuning" attaches fine-tuning datasets to LLMs while respecting your permissions. See how:
youtu.be/6udJzJAyT5I
#CopilotTuning #copilot
I agree, really think twice or just don't... Also think about US government accessing your personal data if they want....
https://techcrunch.com/2025/07/19/for-privacy-and-security-think-twice-before-granting-ai-acces…
Geospatial Question Answering on Historical Maps Using Spatio-Temporal Knowledge Graphs and Large Language Models
Ziyi Liu, Sidi Wu, Lorenz Hurni
https://arxiv.org/abs/2508.21491
Information availability in different languages and various technological constraints related to multilinguism on the Internet
Sonal Khosla, Haridasa Acharya
https://arxiv.org/abs/2508.17918
I just implemented librenms-agent and the certificate check on my systems.
I just love the way I can easily access information about a system across its configuration.
For the certificate check I need the domain/s of the system.
While I'm sure this could be further improved it is already a lot of fun to use.
```
az-librenms-certificate = {
enable = true;
domains = [
{ fqdn = "${config.services.freshrss.virtualHost}&qu…
medicX-KG: A Knowledge Graph for Pharmacists' Drug Information Needs
Lizzy Farrugia, Lilian M. Azzopardi, Jeremy Debattista, Charlie Abela
https://arxiv.org/abs/2506.17959
Damn straight he (Trudeau) was a pain, to you. Exactly what we want. https://mstdn.ca/@AlisonCreekside/114729209755196986
Polish president's veto won't threaten Ukraine's Starlink access, Nawrocki's office claims: https://benborges.xyz/2025/08/26/polish-presidents-veto-wont-threaten.html
Really good clear explanation from @…, laying out various problems and risks with trying to implement "age verification" online.
"Firstly, in order to prove your age you’re being asked to hand over some fairly important personal details. ... Usually the company you’re handing these details to is a third party, often one you will never have heard of before. ...
"The data that is being collected for age verification purposes is extremely tempting to hackers ... and at the moment there is no specific regulation outlining the security standards that these companies should meet ...
"Let’s say all the current age verification providers are incredibly robust, though. ... The question still remains... should you be sharing this information with random websites anyway?
"... once you’ve trained the population of an entire country to routinely hand over their credit card details in order to access content, you have given them an incredibly bad habit that it’s going to be tough to break. ... You don’t just prove your age once, after all, you potentially have to do it dozens of times, to access a bunch of different websites. Everything from BlueSky to PornHub to Spotify and even maybe Wikipedia. It becomes a weekly or perhaps monthly occurrence. Just as individual users don’t tend to read every website’s terms and conditions, it’s unlikely they’re all going to do due diligence checks on every provider who asks for ID, especially once they’ve become used to just handing that data over.
"And although that may not be a problem for _you_, you tech-savvy cleverclogs, if you’ve ever found yourself in the position of unpaid IT support for one of your less knowledgeable friends or relatives, hopefully you can see why it’s a huge problem for the UK population more broadly."
And more!
#AgeVerification #OnlineSafetyAct #OSA
2/2 I continued blogging Alberniweather and on FB and Twitter but I gradually removed my personal self from Facebook and eventually during the Pandemic, I decided the Facebook environment was just too toxic even for weather stuff and I shut down my page and left Facebook completely.
The impact on traffic to Alberniweather.ca and its prominence in the community was, and still is, significant.
I have diehard followers, many who have become friends over the years, I still get the odd call from media, or even the public about random weather things.
I have good connections with a few folks at Environment Canada (though their staff have become thinner and more transient :(
and major events still get spikes of local traffic but I since about 2022, and after I removed myself from Twitter that year, I don’t blog nearly as much. I would do a few posts in a week, and then go months without posting. I just got out of the habit I guess.
But I am still interested in the weather. I still feel like Alberniweather is a useful service for people in my community. I still feel a willing obligation to inform people about the weather and I believe I am trusted to do so by the public and local leaders. I’ve never made any money at it, I sold ad space on the website for a few years but it wasn’t worth the hassle and I didn’t feel comfortable taking the money when I was councillor. I have had some generous spontaneous donations at times.
But mainly I do it because it’s interesting, and I hope it is useful for people especially when people are looking for information during a major event.
The highest traffic I have ever had on Alberniweather pre-FB exit was the local Dog Mountain forest fire in 2015.
post-FB exit: the #underwoodfire
People want easy access to reliable local, trusted, information.
Large media orgs have mostly given up on this.
I am grateful we still have an active local newspaper and radio and that both trust me and I trust them.
@… @…
On the Evolution of Federated Post-Training Large Language Models: A Model Accessibility View
Tao Guo, Junxiao Wang, Fushuo Huo, Laizhong Cui, Song Guo, Jie Gui, Dacheng Tao
https://arxiv.org/abs/2508.16261
Shifting Narratives: A Longitudinal Analysis of Media Trends and Public Attitudes on Homelessness
Akshay Irudayaraj (Brown University), Nathan Ye (University of California--Berkeley), Yash Chainani (University of California--Berkeley)
https://arxiv.org/abs/2506.21794
The IRMA Dataset: A Structured Audio-MIDI Corpus for Iranian Classical Music
Sepideh Shafiei, Shapour Hakam
https://arxiv.org/abs/2508.19876 https://arxiv.…
Probing graph topology from local quantum measurements
F. Romeo, J. Settino
https://arxiv.org/abs/2507.23689 https://arxiv.org/pdf/2507.23689
Isto é interessante. Relatório sobre educação nos países da OCDE.
https://www.oecd.org/en/publications/education-at-a-glance-2024_c00cad36-en.html
Broadband Modelling of GRB 230812B Afterglow: Implications for VHE $\gamma$-ray Detection with IACTs
Shraddha Mohnani, Biswajit Banerjee, Davide Miceli, Lara Nava, Gor Oganesyan, Pawan Tiwari, Annarita Ierardi, Alessio L. De Santis, Samanta Macera, Amit Shukla, Marica Branchesi, Swarna Chatterjee, Sushmita Agarwal, Abhirup Datta, Kuldeep Kumar Yadav, G. C. Anupama
Proton launches Lumo, an AI chatbot to summarize documents, generate code, and more and says it will protect users' information via "zero-access" encryption (Emma Roth/The Verge)
https://www.theverge.com/news/711860/proton-privacy-focused-ai-chatbot
Price of Uncertainty for Consensus Games
Yunzhe Bai, Alec Sun
https://arxiv.org/abs/2508.17557 https://arxiv.org/pdf/2508.17557
Analysis of Semantic Communication for Logic-based Hypothesis Deduction
Ahmet Faruk Saz, Siheng Xiong, Faramarz Fekri
https://arxiv.org/abs/2508.21755 https://
Replaced article(s) found for cs.IR. https://arxiv.org/list/cs.IR/new
[1/1]:
- Conversational LLMs Simplify Secure Clinical Data Access, Understanding, and Analysis
Rafi Al Attrach, Pedro Moreira, Rajna Fani, Renato Umeton, Leo Anthony Celi
Podcast: The Tea Hack Just Keeps Getting Worse https://www.404media.co/podcast-the-tea-hack-just-keeps-getting-worse/
Bill Atkinson, Macintosh Pioneer and Inventor of Hypercard, Dies at 74
Atkinson’s gleeful brilliance helped people draw on computer screens and access information via links.
https://www.wired.com/story/bill-atkinson-apple-engineer-dies/
MMSearch-R1: Incentivizing LMMs to Search
Jinming Wu, Zihao Deng, Wei Li, Yiding Liu, Bo You, Bo Li, Zejun Ma, Ziwei Liu
https://arxiv.org/abs/2506.20670 h…
Location Information Sharing Using Software Defined Radio in Multi-UAV Systems
Mehmet Kaan Erol, Eyup Emre Ulku
https://arxiv.org/abs/2506.17678 https://…
Adaptive BSTs for Single-Source and All-to-All Requests: Algorithms and Lower Bounds
Maryam Shiran
https://arxiv.org/abs/2507.20228 https://arxiv.org/pdf/2…
Wi-Fi Sensing Tool Release: Gathering 802.11ax Channel State Information from a Commercial Wi-Fi Access Point
Zisheng Wang, Feng Li, Hangbin Zhao, Zihuan Mao, Yaodong Zhang, Qisheng Huang, Bo Cao, Mingming Cao, Baolin He, Qilin Hou
https://arxiv.org/abs/2506.16957
Consumer Beware! Exploring Data Brokers' CCPA Compliance
Elina van Kempen, Isita Bagayatkar, Pavel Frolikov, Chloe Georgiou, Gene Tsudik
https://arxiv.org/abs/2506.21914
UK to pay for EU defense fund access amidst growing Russia threat, FT reports: https://benborges.xyz/2025/07/22/uk-to-pay-for-eu.html
Using Tactile Charts to Support Comprehension and Learning of Complex Visualizations for Blind and Low-Vision Individuals
Tingying He, Maggie McCracken, Daniel Hajas, Sarah Creem-Regehr, Alexander Lex
https://arxiv.org/abs/2507.21462
The Missing Link: Joint Legal Citation Prediction using Heterogeneous Graph Enrichment
Lorenz Wendlinger, Simon Alexander Nonn, Abdullah Al Zubaer, Michael Granitzer
https://arxiv.org/abs/2506.22165
Harnessing RLHF for Robust Unanswerability Recognition and Trustworthy Response Generation in LLMs
Shuyuan Lin, Lei Duan, Philip Hughes, Yuxuan Sheng
https://arxiv.org/abs/2507.16951
Scale AI emphasizes that it remains an independent company and says Meta will not have access to Scale's internal systems or customers' confidential information (Scale AI)
https://scale.com/blog/customer-trust-scale-meta-deal
Privileged Self-Access Matters for Introspection in AI
Siyuan Song, Harvey Lederman, Jennifer Hu, Kyle Mahowald
https://arxiv.org/abs/2508.14802 https://ar…
Non-spatial symmetries in quantum nonlinear spectroscopy
Li Sun, Chong Chen, Ren-Bao Liu
https://arxiv.org/abs/2508.20445 https://arxiv.org/pdf/2508.20445
Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents
Zhixin Lin, Jungang Li, Shidong Pan, Yibo Shi, Yue Yao, Dongliang Xu
https://arxiv.org/abs/2508.19493
A security researcher said
flaws in a carmaker’s online dealership portal
exposed the private information
and vehicle data of its customers,
and could have allowed hackers to remotely break into any of its customers’ vehicles.
Eaton Zveare, who works as a security researcher at software delivery company Harness,
told TechCrunch the flaw he discovered
allowed the creation of an admin account
that granted “unfettered access” to the unnamed carma…
Of the People, By the Algorithm: How AI Transforms Democratic Representation
Yuval Rymon
https://arxiv.org/abs/2508.19036 https://arxiv.org/pdf/2508.19036
The Random Variables of the DNA Coverage Depth Problem
\c{S}eyma Bodur, Stefano Lia, Hiram H. L\'opez, Rati Ludhani, Alberto Ravagnani, Lisa Seccia
https://arxiv.org/abs/2507.20645
Inference Scaled GraphRAG: Improving Multi Hop Question Answering on Knowledge Graphs
Travis Thompson, Seung-Hwan Lim, Paul Liu, Ruoying He, Dongkuan Xu
https://arxiv.org/abs/2506.19967
Access Control for Information-Theoretically Secure Key-Document Stores
Yin Li, Sharad Mehrota, Shantanu Sharma, Komal Kumari
https://arxiv.org/abs/2507.10730
SimLab: A Platform for Simulation-based Evaluation of Conversational Information Access Systems
Nolwenn Bernard, Sharath Chandra Etagi Suresh, Krisztian Balog, ChengXiang Zhai
https://arxiv.org/abs/2507.04888
Seamless and Efficient Interactions within a Mixed-Dimensional Information Space
Chen Chen
https://arxiv.org/abs/2506.04545 https://a…
Slow Fluid Antenna Multiple Access with Multiport Receivers
Jos\'e P. Gonz\'alez-Coma, F. Javier L\'opez-Mart\'inez
https://arxiv.org/abs/2507.17505 https://
List of the Kremlin’s secret contractors: Russian businesses profiting from the temporarily occupied territories of Ukraine: https://benborges.xyz/2025/07/22/list-of-the-kremlins-secret.html
Integrating Time Series into LLMs via Multi-layer Steerable Embedding Fusion for Enhanced Forecasting
Zhuomin Chen, Dan Li, Jiahui Zhou, Shunyu Wu, Haozheng Ye, Jian Lou, See-Kiong Ng
https://arxiv.org/abs/2508.16059
Rethinking Multi-User Communication in Semantic Domain: Enhanced OMDMA by Shuffle-Based Orthogonalization and Diffusion Denoising
Maojun Zhang, Guangxu Zhu, Xiaoming Chen, Kaibin Huang, Zhaoyang Zhang
https://arxiv.org/abs/2507.20477
The US supreme court on Friday permitted DOGE, the so-called ‘department of government efficiency’, broad access to personal information on millions of Americans in Social Security Administration data systems while a legal challenge plays out.
At the request of the Justice Department, the justices put on hold US district judge Ellen Hollander’s order that had largely blocked Doge’s access to “personally identifiable information”
in data such as medical and financial records while …
Web-Browsing LLMs Can Access Social Media Profiles and Infer User Demographics
Meysam Alizadeh, Fabrizio Gilardi, Zeynab Samei, Mohsen Mosleh
https://arxiv.org/abs/2507.12372
The Democratic Paradox in Large Language Models' Underestimation of Press Freedom
I. Loaiza, R. Vestrelli, A. Fronzetti Colladon, R. Rigobon
https://arxiv.org/abs/2506.18045
Integrating Time Series into LLMs via Multi-layer Steerable Embedding Fusion for Enhanced Forecasting
Zhuomin Chen, Dan Li, Jiahui Zhou, Shunyu Wu, Haozheng Ye, Jian Lou, See-Kiong Ng
https://arxiv.org/abs/2508.16059
RL-Finetuned LLMs for Privacy-Preserving Synthetic Rewriting
Zhan Shi, Yefeng Yuan, Yuhong Liu, Liang Cheng, Yi Fang
https://arxiv.org/abs/2508.19286 https://
Efficient Remote Monitoring through Noisy Random Access with Retransmissions
Sergey Foss, Dmitriy Kim, Andrey Turlikov
https://arxiv.org/abs/2507.12368 htt…
Leveraging Synthetic Data for Question Answering with Multilingual LLMs in the Agricultural Domain
Rishemjit Kaur, Arshdeep Singh Bhankhar, Surangika Ranathunga, Jashanpreet Singh Salh, Sudhir Rajput, Vidhi, Kashish Mahendra, Bhavika Berwal, Ritesh Kumar
https://arxiv.org/abs/2507.16974…
“The Maha report is essentially a distraction from the real causes of poor health,”
said Elizabeth Jacobs, professor emerita at the University of Arizona and a founding member of Defend Public Health.
“This administration does not want to address things like poverty and education and access to healthcare.
Instead, they’re distracting the public with information on solutions to problems that don’t actually exist.
When the foundation of your policy is not evidence-based…
Non-Asymptotic Achievable Rate-Distortion Region for Indirect Wyner-Ziv Source Coding
Jiahui Wei, Philippe Mary, Elsa Dupraz
https://arxiv.org/abs/2507.17432 https://
Cross-Modal Distillation For Widely Differing Modalities
Cairong Zhao, Yufeng Jin, Zifan Song, Haonan Chen, Duoqian Miao, Guosheng Hu
https://arxiv.org/abs/2507.16296
Atom-Searcher: Enhancing Agentic Deep Research via Fine-Grained Atomic Thought Reward
Yong Deng, Guoqing Wang, Zhenzhe Ying, Xiaofeng Wu, Jinzhen Lin, Wenwen Xiong, Yuqin Dai, Shuo Yang, Zhanwei Zhang, Qiwen Wang, Yang Qin, Changhua Meng
https://arxiv.org/abs/2508.12800
On the Role of Early-Termination for Age of Information in Tree-Based Random Access Protocols
Andrea Munari, Cedomir Stefanovic
https://arxiv.org/abs/2506.04793
Lightweight Electronic Signatures and Reliable Access Control Included in Sensor Networks to Prevent Cyber Attacks from Modifying Patient Data
Mishall Al-Zubaidie
https://arxiv.org/abs/2506.08828
AI/ML Life Cycle Management for Interoperable AI Native RAN
Chu-Hsiang Huang, Chao-Kai Wen, Geoffrey Ye Li
https://arxiv.org/abs/2507.18538 https://arxiv.o…
Minimax Data Sanitization with Distortion Constraint and Adversarial Inference
Amirarsalan Moatazedian, Yauhen Yakimenka, R\'emi A. Chou, J\"org Kliewer
https://arxiv.org/abs/2507.17942
Communication Complexity of Exact Sampling under R\'enyi Information
Spencer Hill, Fady Alajaji, Tam\'as Linder
https://arxiv.org/abs/2506.12219 ht…