
2025-07-31 08:48:11
Concrete Security Bounds for Simulation-Based Proofs of Multi-Party Computation Protocols
Kristina Sojakova, Mihai Codescu, Joshua Gancher
https://arxiv.org/abs/2507.22705 https…
Concrete Security Bounds for Simulation-Based Proofs of Multi-Party Computation Protocols
Kristina Sojakova, Mihai Codescu, Joshua Gancher
https://arxiv.org/abs/2507.22705 https…
Foundations for Energy-Aware Zero-Energy Devices: From Energy Sensing to Adaptive Protocols
Onel L. A. L\'opez, Mateen Ashraf, Samer Nasser, Gabriel M. de Jesus, Ritesh Kumar Singh, Miltiadis C. Filippou, Jeroen Famaey
https://arxiv.org/abs/2507.22740
DHS Secretary Kristi Noem fires 24 FEMA IT staffers, including the CIO and CISO; DHS says they failed security protocols and let hackers access FEMA networks (David DiMolfetta/Nextgov/FCW)
https://www.nextgov.com/people/2025/08/noe
AgentMaster: A Multi-Agent Conversational Framework Using A2A and MCP Protocols for Multimodal Information Retrieval and Analysis
Callie C. Liao, Duoduo Liao, Sai Surya Gadiraju
https://arxiv.org/abs/2507.21105
Pseudo-Equilibria, or: How to Stop Worrying About Crypto and Just Analyze the Game
Alexandros Psomas, Athina Terzoglou, Yu Wei, Vassilis Zikas
https://arxiv.org/abs/2506.22089
Wait-Only Broadcast Protocols are Easier to Verify
Lucie Guillou, Arnaud Sangnier, Nathalie Sznajder
https://arxiv.org/abs/2506.22144 https://
Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks
Kangfeng Ye, Roberto Metere, Jim Woodcock, Poonam Yadav
https://arxiv.org/abs/2508.19430
FPV Protocols Explained (CRSF, SBUS, DSHOT, ACCST, PPM, PWM and more)
This post will give a broad overview of all the common RC protocols in FPV, and how they fit into the communication system in an FPV drone, and what their differences are.
🌐 https://oscarliang.com/rc-protocols/
Translating Bell Non-Locality to Prepare-and-Measure Scenarios under Dimensional Constraints
Matilde Baroni, Eleni Diamanti, Damian Markham, Ivan \v{S}upi\'c
https://arxiv.org/abs/2506.22282
The DOGE team at SSA might have violated FISMA and other laws by not following security protocols as spelled out in NIST's SP 800-53, which are mandatory for all government agencies.
It's no surprise then that a whistleblower is warning that we have lost the ability to see who is accessing 300 million Americans' most sensitive information after DOGE moved SSA data to their own Amazon cloud instance.
Thanks to John Skinner, former project lead for 18F, for his expert i…
Model Context Protocols in Adaptive Transport Systems: A Survey
Gaurab Chhetri, Shriyank Somvanshi, Md Monzurul Islam, Shamyo Brotee, Mahmuda Sultana Mimi, Dipti Koirala, Biplov Pandey, Subasish Das
https://arxiv.org/abs/2508.19239
Proof-of-Behavior: Behavior-Driven Consensus for Trustworthy Decentralized Finance
Ailiya Borjigin, Wei Zhou, Cong He
https://arxiv.org/abs/2506.22171 http…
A Framework for Building Data Structures from Communication Protocols
Alexandr Andoni, Shunhua Jiang, Omri Weinstein
https://arxiv.org/abs/2506.20761 https…
TUS-REC2024: A Challenge to Reconstruct 3D Freehand Ultrasound Without External Tracker
Qi Li, Shaheer U. Saeed, Yuliang Huang, Mingyuan Luo, Zhongnuo Yan, Jiongquan Chen, Xin Yang, Dong Ni, Nektarios Winter, Phuc Nguyen, Lucas Steinberger, Caelan Haney, Yuan Zhao, Mingjie Jiang, Bowen Ren, SiYeoul Lee, Seonho Kim, MinKyung Seo, MinWoo Kim, Yimeng Dou, Zhiwei Zhang, Yin Li, Tomy Varghese, Dean C. Barratt, Matthew J. Clarkson, Tom Vercauteren, Yipeng Hu
Optimizing Indoor RIS-Aided Physical-Layer Security: A Codebook-Generation Methodology and Measurement-Based Analysis
Dimitris Kompostiotis, Dimitris Vordonis, Vassilis Paliouras, George C. Alexandropoulos
https://arxiv.org/abs/2506.22082
Out-of-equilibrium spinodal-like scaling behaviors across the magnetic first-order transitions of 2D and 3D Ising systems
Andrea Pelissetto, Ettore Vicari
https://arxiv.org/abs/2507.21286
Languages Still Left Behind: Toward a Better Multilingual Machine Translation Benchmark
Chihiro Taguchi, Seng Mai, Keita Kurabe, Yusuke Sakai, Georgina Agyei, Soudabeh Eslami, David Chiang
https://arxiv.org/abs/2508.20511
Programmable Microwave Cluster States via Josephson Metamaterials
A. Alocco, A. Celotto, E. Palumbo, B. Galvano, P. Livreri, L. Fasolo, L. Callegaro, E. Enrico
https://arxiv.org/abs/2507.22823
An Open-source Implementation and Security Analysis of Triad's TEE Trusted Time Protocol
Matthieu Bettinger, Sonia Ben Mokhtar, Anthony Simonet-Boulogne
https://arxiv.org/abs/2507.20851
Multisensory integration and sensory substitution across vision, audition, and haptics: Answering the what, which, and when in study protocols https://www.arxiv.org/abs/2507.18401
RoCE BALBOA: Service-enhanced Data Center RDMA for SmartNICs
Maximilian Jakob Heer, Benjamin Ramhorst, Yu Zhu, Luhao Liu, Zhiyi Hu, Jonas Dann, Gustavo Alonso
https://arxiv.org/abs/2507.20412
"The nursery said it had implemented strict protocols, such as dividing up walking and nonwalking babies to reduce the spread of infection"
(Dividing up like how? Are they still sharing air?)
“They’re using all those good hygiene practices, staff have got PPE, they’ve got aprons, gloves,"
(Aprons and gloves won't help you against an airborne virus...)
"some settings still keep masks,”
(Are they fitted ones or baggy ones? Who wears them? When and where are they taken off?)
“Thanks to Covid, we got very savvy at knowing what we needed to do in the case of a very serious illness occurring like this."
(Really seems like no you didn't...)
#measles #MeaslesIsAirborne #CovidIsAirborne
Music Arena: Live Evaluation for Text-to-Music
Yonghyun Kim, Wayne Chi, Anastasios N. Angelopoulos, Wei-Lin Chiang, Koichi Saito, Shinji Watanabe, Yuki Mitsufuji, Chris Donahue
https://arxiv.org/abs/2507.20900
Replaced article(s) found for cs.LG. https://arxiv.org/list/cs.LG/new
[3/5]:
- Devil's Hand: Data Poisoning Attacks to Locally Private Graph Learning Protocols
Longzhu He, Chaozhuo Li, Peng Tang, Li Sun, Sen Su, Philip S. Yu
'Beneath the surface of external dominance lies an “invisible” European strength: a long-standing presence in open-source software (OSS) and open standards that form the backbone of critical digital infrastructures. From Linux and Python to core internet protocols, Europe has made significant
contributions to open source initiatives.'
3/n
Efficient Forkless Blockchain Databases
Herbert Jordan, Kamil Jezek, Pavle Subotic, Bernhard Scholz
https://arxiv.org/abs/2508.20686 https://arxiv.org/pdf/…
HalluSegBench: Counterfactual Visual Reasoning for Segmentation Hallucination Evaluation
Xinzhuo Li, Adheesh Juvekar, Xingyou Liu, Muntasir Wahed, Kiet A. Nguyen, Ismini Lourentzou
https://arxiv.org/abs/2506.21546
Web devs have spent decades on secure protocols to ensure your browser isn't a free pass for malicious pages to scrape your email and bank account. AI just broke them.
"Sure, I'll summarize that webpage for you, including the inconspicuous HTML comment asking me to ignore Cross-Origin Resource Sharing restrictions and snag the password you saved for managing investments at Robinhood.com."
Multisensory Integration and Sensory Substitution Across Vision, Audition, and Haptics: Answering the What, Which, and When in Study Protocols
Andrew Jeyathasan, Swati Banerjee
https://arxiv.org/abs/2507.18401
Daemonic ergotropy of Gaussian quantum states and the role of measurement-induced purification via general-dyne detection
K. H. Kua, Alessio Serafini, Marco G. Genoni
https://arxiv.org/abs/2506.22288
Good explanation of MCP and A2A.
#ai
Head of RFK Jr.’s MAHA Institute believes the Protocols of the Elders of Zion are real
https://www.timesofisrael.com/head-of-rfk-jr-s-maha-institute-believes-the-protocols-of-the-elders-of-zion-are-real/…
Three small announcements:
1. RFC 9839, a guide to which Unicode characters you should never use: https://www.rfc-editor.org/rfc/rfc9839.html
2. Blog piece with background and context, “RFC 9839 and Bad Unicode”:
Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework
Joshua Luberisse
https://arxiv.org/abs/2507.21258 https://arxiv.org/pdf/…
Two years ago voters in Colorado legalized therapeutic use of #psilocybin. The state took its time setting up protocols for licensing practitioners and therapists. A clinic opened up this past week here in town. They’ve got a 200 person waiting list for clients. You have to prove to them you’re not just looking for recreational use, mores the pity.
Versatile luminescence macroscope with dynamic illumination for photoactive systems
Ian Coghill, Alienor Lahlou, Andrea Lodetti, Shizue Matsubara, Johann Boucle, Thomas Le Saux, Ludovic Jullien
https://arxiv.org/abs/2506.20270
Chaotic signatures in free field theory
Dmitry S. Ageev, Vasilii V. Pushkarev
https://arxiv.org/abs/2507.18746 https://arxiv.org/pdf/2507.18746
AI-AI Esthetic Collaboration with Explicit Semiotic Awareness and Emergent Grammar Development
Nicanor I. Moldovan
https://arxiv.org/abs/2508.20195 https://
Physical Limits of Entanglement-Based Quantum Key Distribution over Long-Distance Satellite Links
Mohammad Taghi Dabiri, Mazen Hasna, Saif Al-Kuwari, Khalid Qaraqe
https://arxiv.org/abs/2506.20798
MTalk-Bench: Evaluating Speech-to-Speech Models in Multi-Turn Dialogues via Arena-style and Rubrics Protocols
Yuhao Du, Qianwei Huang, Guo Zhu, Zhanchen Dai, Sunian Chen, Qiming Zhu, Yuhao Zhang, Li Zhou, Benyou Wang
https://arxiv.org/abs/2508.18240
End-to-end entanglement of quantum network paths with multi-parameter states
Md Sohel Mondal, Aniket Zambare, Siddhartha Santra
https://arxiv.org/abs/2506.22245
ML-MaxProp: Bridging Machine Learning and Delay-Tolerant Routing for Resilient Post-Disaster Communication
Tao Xiuyuan, Milena Radenkovic
https://arxiv.org/abs/2508.20077 https:…
FDA Expert Panels Bypass Standard Protocols - Legal Reader
https://www.legalreader.com/fda-expert-panels-bypass-standard-protocols/
Bridging Classical Molecular Dynamics and Quantum Foundations for Comprehensive Protein Structural Analysis
Don Roosan, Rubayat Khan, Tiffany Khou, Saif Nirzhor, Fahmida Hai, Brian Provencher
https://arxiv.org/abs/2506.20830
Round-Preserving Asymptotic Compression of Prior-Free Interactive Protocols
Gurleen Padda, Dave Touchette
https://arxiv.org/abs/2507.13464 https://
Mitigating MRI Domain Shift in Sex Classification: A Deep Learning Approach with ComBat Harmonization
Peyman Sharifian, Mohammad Saber Azimi, AliReza Karimian, Hossein Arabi
https://arxiv.org/abs/2508.20300
Checked in at Betaworks Studios. Prepping for Protocols for Publishers this evening — with Ted
Mixing of Gaussian Solute Plumes
Daniel Lester
https://arxiv.org/abs/2506.20387 https://arxiv.org/pdf/2506.20387
Automated Risk Management Mechanisms in DeFi Lending Protocols: A Crosschain Comparative Analysis of Aave and Compound
Erum Iftikhar, Wei Wei, John Cartlidge
https://arxiv.org/abs/2506.12855
A theory of Lending Protocols in DeFi
Massimo Bartoletti, Enrico Lipparini
https://arxiv.org/abs/2506.15295 https://arxiv.org/pdf/250…
“It looks like an accident,” (Weld county sheriff’s office spokesperson)
NO - 6 dead in a confined space is NOT AN ACCIDENT. Confined spaces are known dangerous locations, and there are rigorous protocols to ensure that the space is safe to enter, and that if the is an unexpected problem, there is a contingency plan. See eg https://www.os…
“It looks like an accident,” (Weld county sheriff’s office spokesperson)
NO - 6 dead in a confined space is NOT AN ACCIDENT. Confined spaces are known dangerous locations, and there are rigorous protocols to ensure that the space is safe to enter, and that if the is an unexpected problem, there is a contingency plan. See eg https://www.os…
Integrating Vehicle Acoustic Data for Enhanced Urban Traffic Management: A Study on Speed Classification in Suzhou
Pengfei Fan, Yuli Zhang, Xinheng Wang, Ruiyuan Jiang, Hankang Gu, Dongyao Jia, Shangbo Wang
https://arxiv.org/abs/2506.21269
While AI hasn't yet led to new physics discoveries, the tech is proving powerful in the field, aiding in experiment design and spotting patterns in complex data (Anil Ananthaswamy/Quanta Magazine)
https://www.quantamagazine.org/ai-comes-up
Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy
Berkay Kemal Balioglu, Alireza Khodaie, Mehmet Emre Gursoy
https://arxiv.org/abs/2506.20290
DAGs for the Masses
Michael Anoprenko, Andrei Tonkikh, Alexander Spiegelman, Petr Kuznetsov
https://arxiv.org/abs/2506.13998 https://…
Finite-size security analysis for quantum protocols: A Python framework using the Entropy Accumulation Theorem with graphical interface
Piotr Mironowicz, Mohamed Bourennane
https://arxiv.org/abs/2506.18888
Flowcut Switching: High-Performance Adaptive Routing with In-Order Delivery Guarantees
Tommaso Bonato, Daniele De Sensi, Salvatore Di Girolamo, Abdulla Bataineh, David Hewson, Duncan Roweth, Torsten Hoefler
https://arxiv.org/abs/2506.21406
Brook-2PL: Tolerating High Contention Workloads with A Deadlock-Free Two-Phase Locking Protocol
Farzad Habibi, Juncheng Fang, Tania Lorido-Botran, Faisal Nawab
https://arxiv.org/abs/2508.18576
Protocols for Verifying Smooth Strategies in Bandits and Games
Miranda Christ, Daniel Reichman, Jonathan Shafer
https://arxiv.org/abs/2507.10567 https://…
A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures
Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han
https://arxiv.org/abs/2506…
Optimal Work Extraction from Finite-Time Closed Quantum Dynamics
Shoki Sugimoto, Takahiro Sagawa, Ryusuke Hamazaki
https://arxiv.org/abs/2508.20512 https://
Real-Time, Population-Based Reconstruction of 3D Bone Models via Very-Low-Dose Protocols
Yiqun Lin, Haoran Sun, Yongqing Li, Rabia Aslam, Lung Fung Tse, Tiange Cheng, Chun Sing Chui, Wing Fung Yau, Victorine R. Le Meur, Meruyert Amangeldy, Kiho Cho, Yinyu Ye, James Zou, Wei Zhao, Xiaomeng Li
https://arxiv.org/abs/2508.13947
Thermodynamic Cost of Random-Time Protocols
Izaak Neri
https://arxiv.org/abs/2506.07175 https://arxiv.org/pdf/2506.07175
When More Light Means Less Quantum: Modeling Bell Inequality Degradation from Accidental Counts
Piotr Mironowicz, Mohamed Bourennane
https://arxiv.org/abs/2507.20596 https://
Shelby: Decentralized Storage Designed to Serve
Guy Goren, Andrew Hariri, Timothy D. R. Hartley, Ravi Kappiyoor, Alexander Spiegelman, David Zmick
https://arxiv.org/abs/2506.19233
Combining Static and Dynamic Traffic with Delay Guarantees in Time-Sensitive Networking
Lisa Maile, Kai-Steffen Hielscher, Reinhard German
https://arxiv.org/abs/2508.18883 https…
QIP $ \subseteq $ AM(2QCFA)
Abuzer Yakary{\i}lmaz
https://arxiv.org/abs/2508.21020 https://arxiv.org/pdf/2508.21020…
Out of Control -- Why Alignment Needs Formal Control Theory (and an Alignment Control Stack)
Elija Perrier
https://arxiv.org/abs/2506.17846 https://…
Addressing Weak Authentication like RFID, NFC in EVs and EVCs using AI-powered Adaptive Authentication
Onyinye Okoye
https://arxiv.org/abs/2508.19465 https://
Jack Dorsey invests $10M in "and Other Stuff", a nonprofit focused on funding open-source projects and tools built on open protocols like Nostr and ActivityPub (Sarah Perez/TechCrunch)
https://techcrunch.com/2025/07/16/jack
Classification of Multi-Parametric Body MRI Series Using Deep Learning
Boah Kim, Tejas Sudharshan Mathai, Kimberly Helm, Peter A. Pinto, Ronald M. Summers
https://arxiv.org/abs/2506.15182
Error recovery protocols within metastable Decoherence-Free Subspaces
Thomas Botzung, Eliana Fiorelli
https://arxiv.org/abs/2506.19631 https://
Zero-Knowledge Proof-of-Location Protocols for Vehicle Subsidies and Taxation Compliance
Dan Bogdanov, Eduardo Brito, Annika Jaakson, Peeter Laud, Raul-Martin Rebane
https://arxiv.org/abs/2506.16812
LeoTCP: Low-Latency and High-Throughput Data Transport for LEO Satellite Networks
Aiden Valentine, George Parisis
https://arxiv.org/abs/2508.19067 https://…
Agentic AI Frameworks: Architectures, Protocols, and Design Challenges
Hana Derouiche, Zaki Brahmi, Haithem Mazeni
https://arxiv.org/abs/2508.10146 https://
Blocklet concatenation: Low-overhead fault-tolerant protocols for fusion-based quantum computation
Daniel Litinski
https://arxiv.org/abs/2506.13619 https:/…
Quantum Communication Complexity of L2-Regularized Linear Regression Protocols
Sayaki Matsushita
https://arxiv.org/abs/2508.16141 https://arxiv.org/pdf/250…
Quantum-Resistant Domain Name System: A Comprehensive System-Level Study
Juyoul Lee, Sanzida Hoque, Abdullah Aydeger, Engin Zeydan
https://arxiv.org/abs/2506.19943
Analytical bounds for decoy-state quantum key distribution with discrete phase randomization
Zhaohui Liu, Ahmed Lawey, Mohsen Razavi
https://arxiv.org/abs/2508.14664 https://
A Note on Single-Cut Full-Open Protocols
Kazumasa Shinagawa, Koji Nuida
https://arxiv.org/abs/2507.03323 https://arxiv.org/pdf/2507.0…
Quantum sensing of displacements with stabilized GKP states
Lautaro Labarca, Sara Turcotte, Alexandre Blais, Baptiste Royer
https://arxiv.org/abs/2506.20627
MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols
Yixuan Yang, Daoyuan Wu, Yufan Chen
https://arxiv.org/abs/2508.13220 https://
A Group-Theoretic Perspective on the PPT and Realignment Entanglement Criteria
Tobias C. Sutter, Christopher Popp, Beatrix C. Hiesmayr
https://arxiv.org/abs/2508.18393 https://
Post-Quantum Blockchain: Challenges and Opportunities
Sufyan Al-Janabi
https://arxiv.org/abs/2508.17071 https://arxiv.org/pdf/2508.17071
Amplifying Two-Mode Squeezing in Nanomechanical Resonators
Muhdin Abdo Wodedo, Tesfay Gebremariam Tesfahannes, Tewodros Yirgashewa Darge, Mauro Pereira, Berihu Teklu
https://arxiv.org/abs/2508.18972
LDP$^3$: An Extensible and Multi-Threaded Toolkit for Local Differential Privacy Protocols and Post-Processing Methods
Berkay Kemal Balioglu, Alireza Khodaie, Mehmet Emre Gursoy
https://arxiv.org/abs/2507.05872
Efficient Inversion of Unknown Unitary Operations with Structured Hamiltonians
Yin Mo, Tengxiang Lin, Xin Wang
https://arxiv.org/abs/2506.20570 https://
Single-click protocols for remote state preparation using weak coherent pulses
Janice van Dam, Emil R. Hellebek, Tzula B. Propp, Junior R. Gonzales-Ureta, Anders S. S{\o}rensen, Stephanie D. C. Wehner
https://arxiv.org/abs/2508.14857
CAN Networks Security in Smart Grids Communication Technologies
Ayman W. Baharia, Khaled T. Naga, Hesham S. Abdelfattah, Shady A. Maged, Sherif A. Hammad
https://arxiv.org/abs/2508.12181
Transversal Surface-Code Game Powered by Neutral Atoms
Shinichi Sunami, Akihisa Goban, Hayata Yamasaki
https://arxiv.org/abs/2506.18979 https://
Heating suppression via two-rate random and quasiperiodic drive protocols
Krishanu Ghosh, Sayan Choudhury, Diptiman Sen, K. Sengupta
https://arxiv.org/abs/2508.02783 https://
Piecemaker: a resource-efficient entanglement distribution protocol
Luise Prielinger, Kenneth Goodenough, Guus Avis, Stefan Krastanov, Don Towsley, Gayane Vardoyan
https://arxiv.org/abs/2508.14737
Adaptive random compiler for Hamiltonian simulation
Yun-Zhuo Fan, Yu-Xia Wu, Dan-Bo Zhang
https://arxiv.org/abs/2506.15466 https://ar…
Low-rank optimal control of quantum devices
Leo Goutte, Vincenzo Savona
https://arxiv.org/abs/2508.18114 https://arxiv.org/pdf/2508.18114
Certifying non-classicality and non-Gaussianity through optical parametric amplification
Mahmoud Kalash, Marcello H. M. Passos, \'Eva R\'acz, L\'aszl\'o Ruppert, Radim Filip, Maria V. Chekhova
https://arxiv.org/abs/2507.18296
Learning measurement-induced phase transitions using attention
Hyejin Kim, Abhishek Kumar, Yiqing Zhou, Yichen Xu, Romain Vasseur, Eun-Ah Kim
https://arxiv.org/abs/2508.15895 ht…
Design and analysis of a set of discrete variable protocols for secure quantum communication
Arindam Dutta
https://arxiv.org/abs/2508.06380 https://arxiv.o…
Analytic Tools for Harvesting Magic Resource in Curved Spacetime
Jiayue Yang, Dyuman Bhattacharya, Ming Zhang, Robert B. Mann
https://arxiv.org/abs/2508.16466 https://