Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26

Attack Assessment and Augmented Identity Recognition for Human Skeleton Data

Authors: Joseph G. Zalameda, Megan A. Witherow, Alexander M. Glandon, Jose Aguilera, Khan M. Iftekharuddin | Published: 2026-03-25

Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search

Authors: Yulin Shen, Xudong Pan, Geng Hong, Min Yang | Published: 2026-03-25

Walma: Learning to See Memory Corruption in WebAssembly

Authors: Oussama Draissi, Mark Günzel, Ahmad-Reza Sadeghi, Lucas Davi | Published: 2026-03-25

Toward a Multi-Layer ML-Based Security Framework for Industrial IoT

Authors: Aymen Bouferroum, Valeria Loscri, Abderrahim Benslimane | Published: 2026-03-25

When Understanding Becomes a Risk: Authenticity and Safety Risks in the Emerging Image Generation Paradigm

Authors: Ye Leng, Junjie Chu, Mingjie Li, Chenhao Lin, Chao Shen, Michael Backes, Yun Shen, Yang Zhang | Published: 2026-03-25

Forensic Implications of Localized AI: Artifact Analysis of Ollama, LM Studio, and llama.cpp

Authors: Shariq Murtuza | Published: 2026-03-25

Policy-Guided Threat Hunting: An LLM enabled Framework with Splunk SOC Triage

Authors: Rishikesh Sahay, Bell Eapen, Weizhi Meng, Md Rasel Al Mamun, Nikhil Kumar Dora, Manjusha Sumasadan, Sumit Kumar Tetarave, Rod Soto | Published: 2026-03-25

An Adaptive Neuro-Fuzzy Blockchain-AI Framework for Secure and Intelligent FinTech Transactions

Authors: Gunjan Mishra, Yash Mishra | Published: 2026-03-25

How Vulnerable Are Edge LLMs?

Authors: Ao Ding, Hongzong Li, Zi Liang, Zhanpeng Shi, Shuxin Zhuang, Shiqin Tang, Rong Feng, Ping Lu | Published: 2026-03-25