
2025-06-17 10:12:09
Convexity in tensor triangular geometry
Changhan Zou
https://arxiv.org/abs/2506.12429 https://arxiv.org/pdf/2506.12429
Convexity in tensor triangular geometry
Changhan Zou
https://arxiv.org/abs/2506.12429 https://arxiv.org/pdf/2506.12429
This https://arxiv.org/abs/2502.04097 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_qfi…
Unstable $1$-semiadditivity as classifying Goodwillie towers
Connor Malin
https://arxiv.org/abs/2506.11245 https://arxiv.org/pdf/2506…
Replaced article(s) found for cs.AI. https://arxiv.org/list/cs.AI/new
[4/4]:
Improving Large Language Models with Concept-Aware Fine-Tuning
https://
Replaced article(s) found for cs.ET. https://arxiv.org/list/cs.ET/new
[1/1]:
Fish feeding behavior recognition and intensity quantification methods in aquaculture: From singl...
[2025-06-17 Tue (UTC), no new articles found for cs.PF Performance]
toXiv_bot_toot
Recent Advances and Future Directions in Literature-Based Discovery
Andrej Kastrin, Bojan Cestnik, Nada Lavra\v{c}
https://arxiv.org/abs/2506.12385 https:/…
Please note that the photo below, which is making the rounds, is from 1987 and not 2025; Golden Gate anniversary not a protest. See this page:
https://www.vintag.es/2013/09/pictures-of-golden-gate-bridge-50th.html
Replaced article(s) found for cs.CC. https://arxiv.org/list/cs.CC/new
[1/1]:
Limit-sure reachability for small memory policies in POMDPs is NP-complete
Knapsack and Shortest Path Problems Generalizations From A Quantum-Inspired Tensor Network Perspective
Sergio Mu\~niz Subi\~nas, Jorge Mart\'inez Mart\'in, Alejandro Mata Ali, Javier Sedano, \'Angel Miguel Garc\'ia-Vico
https://arxiv.org/abs/2506.11711
Evaluating Large Language Models for Phishing Detection, Self-Consistency, Faithfulness, and Explainability
Shova Kuikel, Aritran Piplai, Palvi Aggarwal
https://arxiv.org/abs/2506.13746
This https://arxiv.org/abs/2501.17707 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csOS_…
From over-reliance to smart integration: using Large-Language Models as translators between specialized modeling and simulation tools
Philippe J. Giabbanelli, John Beverley, Istvan David, Andreas Tolk
https://arxiv.org/abs/2506.11141
Die Bilder und Videos von den #NoKing Protesten haben mir übrigens Hoffnung gemacht.
https://omfg.town/@dansinker/114690663638438881
Gesehen habe ich sie auf imgur.…
Replaced article(s) found for stat.ML. https://arxiv.org/list/stat.ML/new
[1/1]:
Gaussian Process Regression for Inverse Problems in Linear PDEs
ht…
Exploring the Potential of Metacognitive Support Agents for Human-AI Co-Creation
Frederic Gmeiner, Kaitao Luo, Ye Wang, Kenneth Holstein, Nikolas Martelaro
https://arxiv.org/abs/2506.12879
Replaced article(s) found for astro-ph.EP. https://arxiv.org/list/astro-ph.EP/new
[1/1]:
A Next-Generation Exoplanet Atmospheric Retrieval Framework for Transmission Spectroscopy (NEXOTR...
Secure API-Driven Research Automation to Accelerate Scientific Discovery
Tyler J. Skluzacek, Paul Bryant, A. J. Ruckman, Daniel Rosendo, Suzanne Prentice, Michael J. Brim, Ryan Adamson, Sarp Oral, Mallikarjun Shankar, Rafael Ferreira da Silva
https://arxiv.org/abs/2506.11950
Subjective Experience in AI Systems: What Do AI Researchers and the Public Believe?
Noemi Dreksler, Lucius Caviola, David Chalmers, Carter Allen, Alex Rand, Joshua Lewis, Philip Waggoner, Kate Mays, Jeff Sebo
https://arxiv.org/abs/2506.11945
The Moduli Stack of Breuil-Kisin Modules with Descent Data for Reductive Groups
Eivind Otto Hjelle
https://arxiv.org/abs/2506.11910 https://
This https://arxiv.org/abs/2410.00854 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_qfi…
On pure monomorphisms and pure epimorphisms in accessible categories
Leonid Positselski
https://arxiv.org/abs/2506.13374 https://arxi…
Gradients of unitary optical neural networks using parameter-shift rule
Jinzhe Jiang, Yaqian Zhao, Xin Zhang, Chen Li, Yunlong Yu, Hailing Liu
https://arxiv.org/abs/2506.11565
Replaced article(s) found for cs.PF. https://arxiv.org/list/cs.PF/new
[1/1]:
EvalNet: A Practical Toolchain for Generation and Analysis of Extreme-Scale Interconnects
ExtendAttack: Attacking Servers of LRMs via Extending Reasoning
Zhenhao Zhu, Yue Liu, Yingwei Ma, Hongcheng Gao, Nuo Chen, Yanpei Guo, Wenjie Qu, Huiying Xu, Xinzhong Zhu, Jiaheng Zhang
https://arxiv.org/abs/2506.13737
Spectral Estimation with Free Decompression
Siavash Ameli, Chris van der Heide, Liam Hodgkinson, Michael W. Mahoney
https://arxiv.org/abs/2506.11994 https:…
A retrospective on DISPEED -- Leveraging heterogeneity in a drone swarm for IDS execution
Vincent Lannurien, Cam\'elia Slimani, Louis Morge-Rollet, Laurent Lemarchand, David Espes, Fr\'ed\'eric Le Roy, Jalil Boukhobza
https://arxiv.org/abs/2506.11800
Development of a Smart Autonomous Irrigation System Using Iot and AI
Yunus Emre Kunt
https://arxiv.org/abs/2506.11835 https://arxiv.o…
On the sum of a prime and a square-free number with divisibility conditions
Ethan S. Lee, Rowan O'Clarey
https://arxiv.org/abs/2506.11814 https://
This https://arxiv.org/abs/2406.12417 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_qfi…
Torsion Theories in a Non-pointed Context
Andrea Cappelletti, Andrea Montoli
https://arxiv.org/abs/2506.13349 https://arxiv.org/pdf/2…
[2025-06-16 Mon (UTC), 1 new article found for cs.ET Emerging Technologies]
toXiv_bot_toot
[2025-06-16 Mon (UTC), no new articles found for cs.PF Performance]
toXiv_bot_toot
EBS-CFL: Efficient and Byzantine-robust Secure Clustered Federated Learning
Zhiqiang Li, Haiyong Bao, Menghong Guan, Hao Pan, Cheng Huang, Hong-Ning Dai
https://arxiv.org/abs/2506.13612
This https://arxiv.org/abs/2404.03976 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_qfi…
Bounded Memory in Distributed Networks
Ran Ben Basat, Keren Censor-Hillel, Yi-Jun Chang, Wenchen Han, Dean Leitersdorf, Gregory Schwartzman
https://arxiv.org/abs/2506.11644
Designing Effective LLM-Assisted Interfaces for Curriculum Development
Abdolali Faraji, Mohammadreza Tavakoli, Mohammad Moein, Mohammadreza Molavi, G\'abor Kismih\'ok
https://arxiv.org/abs/2506.11767
On generalised Pythagorean triples over number fields
Pedro-Jos\'e Cazorla Garc\'ia
https://arxiv.org/abs/2506.11636 https://…
Integration of a categorical operad
Dominik Trnka
https://arxiv.org/abs/2506.12399 https://arxiv.org/pdf/2506.12399
Unlearning-Enhanced Website Fingerprinting Attack: Against Backdoor Poisoning in Anonymous Networks
Yali Yuan, Kai Xu, Ruolin Ma, Yuchen Zhang
https://arxiv.org/abs/2506.13563
Capsule: Efficient Player Isolation for Datacenters
Zhouheng Du, Nima Davari, Li Li, Nodir Kodirov
https://arxiv.org/abs/2506.11483 https://
Stackification via adjunction
Zheng Wei
https://arxiv.org/abs/2506.12050 https://arxiv.org/pdf/2506.12050
Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information
Xiao Zhan, Juan Carlos Carrillo, William Seymour, Jose Such
https://arxiv.org/abs/2506.11680
Mechanisms of information communication and market price movements. The case of SP 500 market
Inga Ivanova, Grzegorz Rzadkowski
https://arxiv.org/abs/2505.09625
A geometric determinant method and geometric dimension growth
Tijs Buggenhout, Yotam I. Hendel, Floris Vermeulen
https://arxiv.org/abs/2506.11624 https://
Watermarking LLM-Generated Datasets in Downstream Tasks
Yugeng Liu, Tianshuo Cong, Michael Backes, Zheng Li, Yang Zhang
https://arxiv.org/abs/2506.13494 ht…
[2025-06-17 Tue (UTC), 5 new articles found for math.CT Category Theory]
toXiv_bot_toot
The impact of economic policies on housing prices. Approximations and predictions in the UK, the US, France, and Switzerland from the 1980s to today
Nicolas Houli\'e
https://arxiv.org/abs/2505.09620
SwiftSpec: Ultra-Low Latency LLM Decoding by Scaling Asynchronous Speculative Decoding
Ziyi Zhang, Ziheng Jiang, Chengquan Jiang, Menghan Yu, Size Zheng, Haibin Lin, Henry Hoffmann, Xin Liu
https://arxiv.org/abs/2506.11309
Expert Insight-Based Modeling of Non-Kinetic Strategic Deterrence of Rare Earth Supply Disruption:A Simulation-Driven Systematic Framework
Wei Meng
https://arxiv.org/abs/2506.11645
Equations defining Jacobians with Real Multiplication
Rahul Mistry, Ramesh Sreekantan
https://arxiv.org/abs/2506.11459 https://arxiv.…
From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs
Alsharif Abuadbba, Chris Hicks, Kristen Moore, Vasilios Mavroudis, Burak Hasircioglu, Diksha Goel, Piers Jennings
https://arxiv.org/abs/2506.13434
Replaced article(s) found for math.CT. https://arxiv.org/list/math.CT/new
[1/1]:
Double groupoids and $2$-groupoids in regular Mal'tsev categories
[2025-06-16 Mon (UTC), no new articles found for q-fin.ST Statistical Finance]
toXiv_bot_toot
[2025-06-16 Mon (UTC), 5 new articles found for cs.DC Distributed, Parallel, and Cluster Computing]
toXiv_bot_toot
The Strategic Imperative for Healthcare Organizations to Build Proprietary Foundation Models
Naresh Tiwari
https://arxiv.org/abs/2506.11412 https://…
A survey of The Prouhet-Tarry-Escott Problem and its Generalizations
Chen Shuwen
https://arxiv.org/abs/2506.11429 https://arxiv.org/p…
New characterization of full weight spectrum one-orbit cyclic subspace codes
Minjia Shi, Wenhao Song
https://arxiv.org/abs/2506.13418 https://
[2025-06-16 Mon (UTC), no new articles found for math.CT Category Theory]
toXiv_bot_toot
WIP: Exploring the Value of a Debugging Cheat Sheet and Mini Lecture in Improving Undergraduate Debugging Skills and Mindset
Andrew Ash, John Hu
https://arxiv.org/abs/2506.11339
Replaced article(s) found for cs.DC. https://arxiv.org/list/cs.DC/new
[1/1]:
Advancing Hybrid Defense for Byzantine Attacks in Federated Learning
htt…
The Rich Get Richer in Bitcoin Mining Induced by Blockchain Forks
Akira Sakurai, Kazuyuki Shudo
https://arxiv.org/abs/2506.13360 https://
On the intervals for the non-existence of covering systems with distinct moduli
Jack Dalton, Nic Jones
https://arxiv.org/abs/2506.11359 https://
Tady: A Neural Disassembler without Structural Constraint Violations
Siliang Qin, Fengrui Yang, Hao Wang, Bolun Zhang, Zeyu Gao, Chao Zhang, Kai Chen
https://arxiv.org/abs/2506.13323
Social Scientists on the Role of AI in Research
Tatiana Chakravorti, Xinyu Wang, Pranav Narayanan Venkit, Sai Koneru, Kevin Munger, Sarah Rajtmajer
https://arxiv.org/abs/2506.11255
Building Automotive Security on Internet Standards: An Integration of DNSSEC, DANE, and DANCE to Authenticate and Authorize In-Car Services
Timo Salomon, Mehmet Mueller, Philipp Meyer, Thomas C. Schmidt
https://arxiv.org/abs/2506.13261
The Memory Paradox: Why Our Brains Need Knowledge in an Age of AI
Barbara Oakley, Michael Johnston, Ken-Zen Chen, Eulho Jung, Terrence J. Sejnowski
https://arxiv.org/abs/2506.11015
On Immutable Memory Systems for Artificial Agents: A Blockchain-Indexed Automata-Theoretic Framework Using ECDH-Keyed Merkle Chains
Craig Steven Wright
https://arxiv.org/abs/2506.13246
[2025-06-16 Mon (UTC), 9 new articles found for cs.CY Computers and Society]
toXiv_bot_toot
Screen Hijack: Visual Poisoning of VLM Agents in Mobile Environments
Xuan Wang, Siyuan Liang, Zhe Liu, Yi Yu, Yuliang Lu, Xiaochun Cao, Ee-Chien Chang
https://arxiv.org/abs/2506.13205
Safe-Child-LLM: A Developmental Benchmark for Evaluating LLM Safety in Child-AI Interactions
Junfeng Jiao, Saleh Afroogh, Kevin Chen, Abhejay Murali, David Atkinson, Amit Dhurandhar
https://arxiv.org/abs/2506.13510
Dual Protection Ring: User Profiling Via Differential Privacy and Service Dissemination Through Private Information Retrieval
Imdad Ullah, Najm Hassan, Tariq Ahamed Ahangar, Zawar Hussain Shah, Mehregan Mahdavi Andrew Levula
https://arxiv.org/abs/2506.13170
pySpainMobility: a Python Package to Access and Manage Spanish Open Mobility Data
Ciro Beneduce, Tania Gull\'on Mu\~noz-Repiso, Bruno Lepri, Massimiliano Luca
https://arxiv.org/abs/2506.13385
Using LLMs for Security Advisory Investigations: How Far Are We?
Bayu Fedra Abdullah, Yusuf Sulistyo Nugroho, Brittany Reid, Raula Gaikovina Kula, Kazumasa Shimari, Kenichi Matsumoto
https://arxiv.org/abs/2506.13161
Detecting Hard-Coded Credentials in Software Repositories via LLMs
Chidera Biringa, Gokhan Kul
https://arxiv.org/abs/2506.13090 https://
Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions
Steven Su, Erik Rye, Robert Beverly, Dave Levin
https://arxiv.org/abs/2506.13052
Position: Certified Robustness Does Not (Yet) Imply Model Security
Andrew C. Cullen, Paul Montague, Sarah M. Erfani, Benjamin I. P. Rubinstein
https://arxiv.org/abs/2506.13024
Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Nima Naderloui, Shenao Yan, Binghui Wang, Jie Fu, Wendy Hui Wang, Weiran Liu, Yuan Hong
https://arxiv.org/abs/2506.13009
Open Source, Open Threats? Investigating Security Challenges in Open-Source Software
Seyed Ali Akhavani, Behzad Ousat, Amin Kharraz
https://arxiv.org/abs/2506.12995
Cut Tracing with E-Graphs for Boolean FHE Circuit Synthesis
Julien de Castelnau, Mingfei Yu, Giovanni De Micheli
https://arxiv.org/abs/2506.12883 https://
Universal Jailbreak Suffixes Are Strong Attention Hijackers
Matan Ben-Tov, Mor Geva, Mahmood Sharif
https://arxiv.org/abs/2506.12880 https://
Privacy-Preserving Federated Learning against Malicious Clients Based on Verifiable Functional Encryption
Nina Cai, Jinguang Han
https://arxiv.org/abs/2506.12846
Bidirectional Biometric Authentication Using Transciphering and (T)FHE
Joon Soo Yoo, Tae Min Ahn, Ji Won Yoon
https://arxiv.org/abs/2506.12802 https://
Versatile and Fast Location-Based Private Information Retrieval with Fully Homomorphic Encryption over the Torus
Joon Soo Yoo, Taeho Kim, Ji Won Yoon
https://arxiv.org/abs/2506.12761
SecurityLingua: Efficient Defense of LLM Jailbreak Attacks via Security-Aware Prompt Compression
Yucheng Li, Surin Ahn, Huiqiang Jiang, Amir H. Abdi, Yuqing Yang, Lili Qiu
https://arxiv.org/abs/2506.12707
SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation
Yashothara Shanmugarasa, Ming Ding, M. A. P Chamikara, Thierry Rakotoarivelo
https://arxiv.org/abs/2506.12699
Alphabet Index Mapping: Jailbreaking LLMs through Semantic Dissimilarity
Bilal Saleh Husain
https://arxiv.org/abs/2506.12685 https://…
Watermarking Quantum Neural Networks Based on Sample Grouped and Paired Training
Limengnan Zhou, Hanzhou Wu
https://arxiv.org/abs/2506.12675 https://
GNSS Spoofing Detection Based on Opportunistic Position Information
Wenjie Liu, Panos Papadimitratos
https://arxiv.org/abs/2506.12580 https://
MEraser: An Effective Fingerprint Erasure Approach for Large Language Models
Jingxuan Zhang, Zhenhua Xu, Rui Hu, Wenpeng Xing, Xuhong Zhang, Meng Han
https://arxiv.org/abs/2506.12551
Privacy-preserving and reward-based mechanisms of proof of engagement
Matteo Marco Montanari, Alessandro Aldini
https://arxiv.org/abs/2506.12523 https://…
When Forgetting Triggers Backdoors: A Clean Unlearning Attack
Marco Arazzi, Antonino Nocera, Vinod P
https://arxiv.org/abs/2506.12522 https://
Exploiting AI for Attacks: On the Interplay between Adversarial AI and Offensive AI
Saskia Laura Schr\"oer, Luca Pajola, Alberto Castagnaro, Giovanni Apruzzese, Mauro Conti
https://arxiv.org/abs/2506.12519
Towards Safety and Security Testing of Cyberphysical Power Systems by Shape Validation
Alexander Geiger, Immanuel Hacker, \"Omer Sen, Andreas Ulbig
https://arxiv.org/abs/2506.12466
Pushing the Limits of Safety: A Technical Report on the ATLAS Challenge 2025
Zonghao Ying, Siyang Wu, Run Hao, Peng Ying, Shixuan Sun, Pengyu Chen, Junze Chen, Hao Du, Kaiwen Shen, Shangkun Wu, Jiwei Wei, Shiyuan He, Yang Yang, Xiaohai Xu, Ke Ma, Qianqian Xu, Qingming Huang, Shi Lin, Xun Wang, Changting Lin, Meng Han, Yilei Jiang, Siqi Lai, Yaozhi Zheng, Yifei Song, Xiangyu Yue, Zonglei Jing, Tianyuan Zhang, Zhilei Zhu, Aishan Liu, Jiakai Wang, Siyuan Liang, Xianglong Kong, Hainan Li, …
InverTune: Removing Backdoors from Multimodal Contrastive Learning Models via Trigger Inversion and Activation Tuning
Mengyuan Sun, Yu Li, Yuchen Liu, Bo Du, Yunjie Ge
https://arxiv.org/abs/2506.12411
Restoring Gaussian Blurred Face Images for Deanonymization Attacks
Haoyu Zhai, Shuo Wang, Pirouz Naghavi, Qingying Hao, Gang Wang
https://arxiv.org/abs/2506.12344
Information-theoretic Estimation of the Risk of Privacy Leaks
Kenneth Odoh
https://arxiv.org/abs/2506.12328 https://arxiv.org/pdf/250…
QGuard:Question-based Zero-shot Guard for Multi-modal LLM Safety
Taegyeong Lee, Jeonghwa Yoo, Hyoungseo Cho, Soo Yong Kim, Yunho Maeng
https://arxiv.org/abs/2506.12299
InfoFlood: Jailbreaking Large Language Models with Information Overload
Advait Yadav, Haibo Jin, Man Luo, Jun Zhuang, Haohan Wang
https://arxiv.org/abs/2506.12274