Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification

Authors: Thorsten Peinemann, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Esfandiar Mohammadi | Published: 2025-08-07

Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs)

Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07

PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction

Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07

Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination

Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07

JPS: Jailbreak Multimodal Large Language Models with Collaborative Visual Perturbation and Textual Steering

Authors: Renmiao Chen, Shiyao Cui, Xuancheng Huang, Chengwei Pan, Victor Shea-Jay Huang, QingLin Zhang, Xuan Ouyang, Zhexin Zhang, Hongning Wang, Minlie Huang | Published: 2025-08-07

Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing Technologies

Authors: Marc Damie, Mihai Pop, Merijn Posthuma | Published: 2025-08-06

Matrix-Free Two-to-Infinity and One-to-Two Norms Estimation

Authors: Askar Tsyganov, Evgeny Frolov, Sergey Samsonov, Maxim Rakhuba | Published: 2025-08-06

Prompt Injection Vulnerability of Consensus Generating Applications in Digital Democracy

Authors: Jairo Gudiño-Rosero, Clément Contet, Umberto Grandi, César A. Hidalgo | Published: 2025-08-06

What If, But Privately: Private Counterfactual Retrieval

Authors: Shreya Meel, Mohamed Nomeir, Pasan Dissanayake, Sanghamitra Dutta, Sennur Ulukus | Published: 2025-08-05

Intrusion Detection in Heterogeneous Networks with Domain-Adaptive Multi-Modal Learning

Authors: Mabin Umman Varghese, Zahra Taghiyarrenani | Published: 2025-08-05