| [v9] | Concept-Guided Fine-Tuning: Steering ViTs away from Spurious Correlations to Improve Robustness https://arxiv.org/abs/2603.08309Model performance is typically contrasted with in-distribution accuracy on standard benchmarks like ImageNet and its variants (ImageNet-v2 ).Our work evaluates extensively on these OOD datasets to demonstrate meaningful improvements in robustness. ... |
| [v46] | Decentralized Multi-Agent Swarms for Autonomous Grid Security in Industrial IoT: A Consensus-based Approach https://doi.org/10.48550/arXiv.2601.17303CVT combines Byzantine fault-tolerant consensus protocols with domain-specific threat scoring via a weighted voting system that accounts for each agent's accuracy and the proximity of its threat to its own threat assessment. CVT achieves sub-millise... |
| [v81] | Federated microservices architecture with blockchain for privacy-preserving and scalable healthcare analytics https://doi.org/10.1038/s41598-026-39837-1Blockchain's immutable ledger and smart contract capabilities have been explored for healthcare auditability and data integrity. Kumar et al. surveyed blockchain-integrated federated learning in edge-fog-cloud healthcare applications, highlighting se... |
| [v84] | Pipeline monitoring data recovery using novel deep learning models: an engineering case study https://pubmed.ncbi.nlm.nih.gov/41127626/The model integrates three components: the prairie dog optimization algorithm (PDO) for hyperparameter tuning, the bidirectional gated recurrent unit (BiGRU) for effective temporal feature extraction, and the generative adversarial network (GAN) for ... |
| [v92] | State-of-the-Art Deep Learning Methods for Microscopic Image Segmentation: Applications to Cells, Nuclei, and Tissues https://doi.org/10.3390/jimaging10120311The system demonstrates significant performance improvements, with cross-magnification MAP increasing from 0.313 to 0.551, and a 15.68% boost in cross-domain adaptability. Overall, FARS effectively delivers reliable predictions in medical image analy... |
| [v114] | A Bayesian Framework for Uncertainty-Aware Explanations in Power Quality Disturbance Classification https://arxiv.org/abs/2604.13658Second, each posterior sample θ (s) simultaneously generates a predictive sample f θ (s) (x) and an explanation sample R (s) (x), thereby coupling predictive and explanation uncertainty through shared posterior draws.This structural parallel with Bay... |
| [v299] | D3HRL: A Distributed Hierarchical Reinforcement Learning Approach Based on Causal Discovery and Spurious Correlation Detection https://doi.org/10.48550/arxiv.2505.01979Sample-efficient goal-conditioned reinforcement learning via predictive information bottleneck for goal representation learning. Q Zou, E Suzuki, 2023 IEEE International Conference on Robotics and Automation (ICRA). IEEE2023 Highly valued subgoal ge... |
| [v385] | AI brings clear opportunity and real risk. https://www.softwareimprovementgroup.com/blog/iso-standards-for-ai/ISO and IEC publish a coherent set of standards that cover AI concepts, lifecycle engineering, risk management, governance and quality. Start with the items below to structure your program and your audits. Purpose in your AI program ISO/IEC 42001:2... |
| [v448] | 2019 AI Alignment Literature Review and Charity Comparison (Larks) (summarized by Rohin): As in three previous years (AN #38), this mammoth post goes through the work done within AI alignment from De https://www.lesswrong.com/s/dT7CKGXwq9vt76CeX/p/D7CY29s2D6HJirqcFAdversarial imitation learning seeks to avoid this by training a discriminator reward model with the agent: the discriminator is trained via supervised learning to distinguish between expert trajectories and agent trajectories, while the agent tries ... |
| [v461] | ONG: One-Shot NMF-based Gradient Masking for Efficient Model Sparsification https://arxiv.org/abs/2508.12891Deep Neural Networks (DNNs) have achieved remarkable success but their large size poses deployment challenges. While various pruning techniques exist, many involve complex iterative processes, specialized criteria, or struggle to maintain sparsity ef... |
| [v478] | The transition from simple Large Language Model (LLM) calls to autonomous AI agents represents a paradigm shift in software engineering. https://dev.to/kuldeep_paul/top-10-metrics-to-monitor-for-reliable-ai-agent-performance-4b36In Retrieval Augmented Generation (RAG) systems, this is often measured as ""Faithfulness"": is the answer derived strictly from the retrieved context? Why it matters: In domains like healthcare, finance, or legal, a hallucination is a liability. H... |
| [v511] | Reducing inference cost of Alzheimer's disease identification using an uncertainty-aware ensemble of uni-modal and multi-modal learners https://pubmed.ncbi.nlm.nih.gov/39952976/We propose a novel MRI- and FDG PET-based multi-modal deep learning approach that mimics clinical decision-making by incorporating uncertainty estimates of an MRI-based model (generated using Monte Carlo dropout and evidential deep learning) to deter... |
| [v547] | RAL2M: Retrieval Augmented Learning-To-Match Against Hallucination in Compliance-Guaranteed Service Systems https://doi.org/10.48550/arXiv.2601.02917To our knowledge, this work is the first to systematically study LLMs for query matching with a focus on hallucination mitigation, formulating the Retrieval-Augmented Learningto-Match problem for LLM deployment with zero-generation hallucination in c... |
| [v570] | Facilitates the identification of counterfactual queries in structural causal models via the ID* and IDC* algorithms by Shpitser, I. and Pearl, J. (2007, 2008) , . http://cran.ma.ic.ac.uk/web/packages/cfid/index.htmlConstruction of parallel worlds graphs and counterfactual graphs is carried out automatically based on the counterfactual query and the causal diagram. See Tikka, S. (2023) for a tutorial of the package. Suggests: covr, dagitty, igraph, mockery, tes... |
| [v577] | Neurosymbolic Framework for Concept-Driven Logical Reasoning in Skeleton-Based Human Action Recognition https://arxiv.org/abs/2605.07140Our framework bridges representation learning and symbolic inference by grounding first-order logic predicates in learnable spatial and temporal motion concepts. Specifically, we employ a standard spatio-temporal skeleton encoder to extract latent mo... |
| [v625] | Stability-Driven Motion Generation for Object-Guided Human-Human Co-Manipulation https://arxiv.org/abs/2604.20336Our results (d) maintain coordinated grasps and stable payload alignment, whereas previous methods exhibit slipping contacts or delayed responses when the green object changes its pose. Figure 5 .Figure 6 . 56 Figure 5. Cooperative motions produce... |
| [v647] | Secure Pipelines, Smarter AI: LLM-Powered Data Engineering for Threat Detection and Compliance https://www.preprints.org/manuscript/202504.1365When combined, they can support audit trails, selective data masking, and fine-grained control policies that satisfy both technical and legal scrutiny . The hybrid compliance layer enhances not only governance but also explainability. While LLMs enr... |
| [v654] | Efficient Domain Coverage for Vehicles with Second-Order Dynamics via Multi-Agent Reinforcement Learning https://doi.org/10.48550/arxiv.2211.05952However, designing model-based controllers is challenging, and the state-of-the-art classical control policy still exhibits a large degree of sub-optimality. In this paper, we present a reinforcement learning (RL) approach for the multi-agent efficie... |
| [v675] | InterAgent: Physics-based Multi-agent Command Execution via Diffusion on Interaction Graphs https://doi.org/10.48550/arXiv.2512.07410We further propose a novel interaction graph exteroception representation that explicitly captures fine-grained joint-to-joint spatial dependencies to facilitate network learning. Additionally, within it we devise a sparse edge-based attention mechan... |
| [v676] | Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth https://www.semanticscholar.org/paper/de7e81b1c897c85e0bc88e6644ece43bcac06c4fBased on the above discussion, in this paper, we focus on the problem of bandwidth-constrained communication in MARL. To simultaneously address the challenges of whom to communicate with and what to communicate, we propose a novel and universal multi... |
| [v696] | State-Action Inpainting Diffuser for Continuous Control with Delay https://arxiv.org/abs/2603.01553The fundamental limitation of explicit belief estimation lies in the nature of the regression task involved in continuous control.Unlike classification, where decision boundaries can be robust to minor perturbations, continuous state regression is hi... |
| [v722] | Learning-Based Resource Allocation Scheme for TDD-Based CRAN System https://arxiv.org/abs/1608.07949However, for time division duplex (TDD) MIMO systems, the resource allocation is done based on instantaneous CSI availability (without using learning, or considering the CSI acquistion overhead), where resource allocation is referred to RB assignment... |
| [v758] | Maintainer: Hans W. Borchers <[email protected]> https://cran.asia/web/packages/pracma/refman/pracma.htmlB.A. Pearlmutter, Fast Exact Multiplication by the Hessian, Neural Computation (1994), Vol. 6, Issue 1, pp.... |
| [v804] | A Loss Curvature Perspective on Training Instability in Deep Learning https://arxiv.org/abs/2110.04369Lanczos algorithm only requires Hessian-vector products which can be efficiently computed via Pearlmutter's trick . (2021)... |
| [v821] | The rapid advancements in AI, particularly the release of large language models (LLMs) and their applications, have attracted significant global interest and raised substantial concerns on responsibl http://www.wikicfp.com/cfp/servlet/event.showcfpThese AI systems, especially autonomous LLM agents and those involving multi-agent interacting, require careful system-level engineering to ensure responsible AI and AI safety. In recent years, numerous regulations, principles, and guidelines for re... |
| [v867] | Essentially no human intervention': Chinese AI solves 12-year-old math problem in just 80 hours - and even proves it https://www.techradar.com/pro/essentially-no-human-intervention-chinese-ai-solves-12-year-old-math-problem-in-just-80-hours-and-even-proves-itSimilarly, proofs produced by large language models are prone to hallucination and are far less reliable than formal verification methods. The Chinese team's framework bridges the gap between natural language reasoning and formal machine verificatio... |
| [v869] | IT Security News Daily Summary 2026-03-13 https://www.itsecuritynews.info/it-security-news-daily-summary-2026-03-13/Linux Servers to Full Root Takeover 7:2 : Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries 6:36 : New Critical MediaTek Vulnerability Exposes Android Phone PINs to Theft in 45 seconds 6:36 : RSAC Innovation ... |
| [v885] | authID Unveils Mandate Framework to Establish the Critical Trust and Governance Layer for the Accelerating Agentic AI Market https://www.businesswire.com/news/home/20251118838387/en/authID-Unveils-Mandate-Framework-to-Establish-the-Critical-Trust-and-Governance-Layer-for-the-Accelerating-Agentic-AI-MarketMandate defines how organizations establish accountability for autonomous activity: each agent is sponsored by a verified human so that it operates within explicitly authorized boundaries, and the platform produces immutable records that can be audit... |
| [v888] | Cyber-Resilient Perception: Safeguarding Autonomous Vehicles With Trust-Aware Sensor Fusion https://doi.org/10.1109/sr.2025.3562156This study developed a trust-aware sensor fusion framework to enhance AV resilience against cyber-physical attacks.By leveraging Dirichlet trust distributions, real-time anomaly detection, and cross-sensor consistency checks, the system dynamically r... |
| [v903] | Robotic fleet management systems are increasingly vital for sustainable operations in agriculture, forestry, and other field domains where labor shortages, efficiency, and environmental concerns inte https://www.frontiersin.org/journals/robotics-and-ai/articles/10.3389/frobt.2025.1706910/fullA central design principle of FORMIGA is the standardisation of communication between heterogeneous agents - robots and humans - through the Robot Operating System (ROS). ROS provides a flexible framework for modular robot software, and in FORMIGA it... |
| [v909] | Understanding Generalization through Decision Pattern Shift https://arxiv.org/abs/2605.13148Empirical analyses across multiple datasets and architectures show that, (i) decision patterns form a highly structured, class-consistent space with strong intra-class cohesion and low inter-class confusion, enabling direct analysis of a model's deci... |
| [v923] | Pass Your Professional Google Workspace Administrator Exams - 100% Money Back Guarantee! https://www.test-king.com/cert-Professional-Google-Workspace-Administrator.htmAdministrators are often required to connect Google Workspace with other identity providers, cloud services, or third-party applications. Candidates should gain familiarity with SAML, OAuth, and API access configurations. Practical exercises may incl... |
| [v947] | LLM as Graph Kernel: Rethinking Message Passing on Text-Rich Graphs https://arxiv.org/abs/2603.14937GAT (Velickovic et al., 2017).A type of GNN with attention weights to differentiate neighbor importance during aggregation.This design improves robustness to noisy neighbors, making GAT a representative example of graph models that enhance aggregatio... |
| [v959] | The Role of Blockchain in Zero Trust Architecture | HackerNoon https://hackernoon.com/the-role-of-blockchain-in-zero-trust-architectureBlockchain complements Zero Trust in several critical ways. First, it can store user and device credentials in a manner that makes tampering exceedingly difficult. Where traditional identity systems rely on centralized databases, a blockchain-based i... |
| [v962] | XXX-X-XXXX-XXXX-X/XX/$XX. https://doi.org/10.48550/arxiv.2306.06071We evaluate the impact of various adversarial attacks on the accuracy of YOLOv5, including L-BFGS, FGSM, C&W, BIM, PGD, One Pixel Attack, and Universal Adversarial Perturbations attack . This paper aims to identify and analyze the effect of such atta... |
| [v995] | Frequency-Aware Model Parameter Explorer: A new attribution method for improving explainability https://doi.org/10.48550/arXiv.2510.03245Gradient-based techniques, including Saliency Maps (SM), Grad-CAM , and Score-CAM , improved interpretability but lacked fine-grained Figure 1: An illustration of frequency filtering. The top row displays an image separated into its low-frequency (bl... |
| [v1010] | ReEval: Automatic Hallucination Evaluation for Retrieval-Augmented Large Language Models via Transferable Adversarial Attacks https://aclanthology.org/2024.findings-naacl.85/%T ReEval: Automatic Hallucination Evaluation for Retrieval-Augmented Large Language Models via Transferable Adversarial Attacks... |
| [v1026] | This edition consolidates and stabilizes the generative integration first formalized in PSRT v2.0, and supersedes the earlier PTI-focused v1. https://zenodo.org/records/17932629Process → Structure → Recursion (PSTR) In PSRT v2.1, this generative identity is formally acknowledged but operationally constrained. The framework adopts the bounded formulation: PSRT v2.1 = UTI PTI HPE subject to the Unified Failure Domain (UFD)... |
| [v1039] | Prior to Liverpool, I worked at the University of Oxford, the University of New South Wales, and the Chinese Academy of Sciences. https://cgi.csc.liv.ac.uk/~xiaowei/We also consider verification of both robustness and resilience [Neurocomputing, 2024], as well as extending robustness verification to the deep reinforcement learning [RA-L, 2024]. We extend randomised smoothing technique to reinforcement learning ... |
| [v1040] | CAFED-Net: Cross-Adaptive Federated Learning with Dynamic Adversarial Defence for Real-Time Privacy-Preserving and Threat Detection in Distributed IoT Ecosystems https://doi.org/10.30880/jscdm.2025.06.01.004Their detecting power and the ability to adapt to the simulation-based assessment, however, prove to be more effective than the baseline mode ls in the circumstances that occur under adversarial drift. In this study, the authors introduce a solution ... |
| [v1043] | Hierarchical Task Network Planning for Facilitating Cooperative Multi-Agent Reinforcement Learning https://doi.org/10.48550/arxiv.2306.08359Current MARL approaches often fail to to learn policies effectively in this multi-agent setting due to the joint actions of agents affecting the multi-agent system and the lack of non-zero reward drive. To address this issue, one way is to abstract ... |
| [v1048] | Recently, deep multi-agent reinforcement learning (MARL) has gained significant popularity due to its success in various cooperative multi-agent tasks. https://doi.org/10.48550/arxiv.2308.11272A fully cooperative multi-agent task can be seen as a decentralized partially observable Markov decision process (Dec-POMDP) (Oliehoek and Amato 2016), represented as a tuple G = ⟨S, A, P, r, Z, O, O, I, n, γ⟩.... |
| [v1052] | Total Accepted Paper Count 2670 http://deepnlp.org/content/paper/nips2022Most existing approaches find such attributions either using activations and gradients or by repeatedly perturbing the input. We instead address this challenge by training a second deep network, the Explainer, to predict attributions for a pre-traine... |
| [v1080] | Bipedal Action Model For Humanoid Robot https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260126805).pnThe co-trained of the combined L2/L1 model can be an end-to-end process, where the error between the L1 model's predicted action and a ground-truth demonstration are backpropagated through both models. This allows the high-level L2 model to be fine-t... |
| [v1172] | Hybrid Reputation Aggregation: A Robust Defense Mechanism for Adversarial Federated Learning in 5G and Edge Network Environments https://doi.org/10.1109/OJCOMS.2025.3646134Our ablation studies further demonstrate that the full hybrid system achieves 98.66% accuracy, while the anomaly-only and reputation-only variants drop to 84.77% and 78.52%, respectively, validating the synergistic value of our dual-mechanism approac... |
| [v1211] | Beyond Semantic Relevance: Counterfactual Risk Minimization for Robust Retrieval-Augmented Generation https://arxiv.org/abs/2605.01302Grounded in causal intervention, we introduce a Cognitive Perturbation Protocol to simulate user biases during training, which is then distilled into a lightweight Evidence Critic. This scoring module learns to identify documents that possess suffici... |
| [v1220] | Submitted on 18 Feb 2025 (v1), last revised 3 Sep 2025 (this version, v2)] https://arxiv.org/abs/2502.12616To achieve a trade-off, this paper investigates methods to disentangle content from logical reasoning without a complete formalisation. In particular, we present QuaSAR (for Quasi-Symbolic Abstract Reasoning), a variation of CoT that guides LLMs to o... |
| [v1259] | When you're coordinating multiple ai agents on one task, how do you keep them from breaking the handoffs? - https://community.latenode.com/t/when-youre-coordinating-multiple-ai-agents-on-one-task-how-do-you-keep-them-from-breaking-the-handoffs/60678If it doesn't match, validation fails and you have a clear error, not a silent misinterpretation. The coordination works when you eliminate ambiguity upfront, not when you rely on the AI to figure it out. PixelPioneer88 January 23, 2026, 9:38pm 5 ... |
| [v1321] | The "Awakening Moment" for Agents: EverOS Brand Upgrade and Public Beta Launches the Era of Self-Evolving Memory - Laotian Times https://laotiantimes.com/2026/04/14/the-awakening-moment-for-agents-everos-brand-upgrade-and-public-beta-launches-the-era-of-self-evolving-memory/It natively parses and stores diverse data types (PDFs, images, Word docs, spreadsheets, URLs) via a single API. Its hybrid retrieval fuses dense semantic vectors, sparse keyword matching, and multimodal alignment, ensuring that agents can accurately... |
| [v1334] | Online Bayesian system identification in multivariate autoregressive models via message passing https://arxiv.org/abs/2506.02710N Ta, M Kobilarov, F Dellaert, International Conference on Unmanned Aircraft Systems. IEEE2014 Linear optimal control on factor graphs-a message passing perspective. C Hoffmann, P Rostalski, IFAC-PapersOnLine. 5012017 A unifying view of estimation ... |
| [v1346] | HawkEye 360, Inc.: 424B4 (424B4) https://www.sec.gov/Archives/edgar/data/0001628280/0001628280-26-032207-index.htmOur customers face ongoing adversarial threats in active conflicts and require real-time situational awareness across the signal spectrum. Customers increasingly demand rapid, actionable data, edge autonomy, and cost-effective mission solutions. Trad... |
| [v1355] | FlowSteer: Guiding Few-Step Image Synthesis with Authentic Trajectories https://arxiv.org/abs/2511.18834Our Online Trajectory Alignment (OTA) resolves both problems by training on authentic teacher trajectories, ensuring the teacher operates on-trajectory and training matches inference distributions.Adversarial distillation on trajectory Adversarial di... |
| [v1365] | One moment, a coin's soaring like a rocket, the next it's plumbing the depths, all within hours. https://digitalfinancenews.com/technology/mastering-crypto-pair-trading-with-rl/A model trained exclusively on bull market data will likely struggle, or even fail, during a bear market. It's like training a racehorse only on flat tracks and then expecting it to win a steeplechase! This necessitates continuous monitoring and oft... |
| [v1372] | Build production RAG that actually works at scale. https://blog.premai.io/building-production-rag-architecture-chunking-evaluation-monitoring-2026-guide/Pure vector (dense) retrieval misses exact-match queries. BM25 (sparse) retrieval misses semantic queries.... |
| [v1592] | A Resilient Distributed Algorithm for Solving Linear Equations https://doi.org/10.1109/cdc49753.2023.10383841Resilient constrained consensus has been partially solved in only for complete graphs and studied in with an incomplete proof.It is worth emphasizing that discrete-time constrained consensus, first proposed in , in general does not enjoy exponentia... |
| [v1679] | Medical Reasoning in the Era of LLMs: A Systematic Review of Enhancement Techniques and Applications https://doi.org/10.48550/arXiv.2508.00669Closing the "accountabil-ity gap" (Habli et al., 2020) requires a robust framework built on shared responsibility policies for developers and institutions (Information Technology Industry Council, 2024), inherently auditable and explainable AI system... |
| [v1806] | Yet its opaque "black boxes" raise serious concerns in high - stakes domains like credit, trading, fraud detection, and risk compliance. https://www.infosecured.ai/i/banking-security/explainable-ai-in-finance/Preferred tools: LIME and SHAP dominate alongside feature - importance and rule - based methods, with hybrid multi - method frameworks growing in popularity. Deficits and challenges: lack of standard evaluation metrics, insufficient user - targeted ... |
| [v1835] | Structure and position-aware graph neural network for airway labeling - NewsBreak https://www.newsbreak.com/news/2484286429231/structure-and-position-aware-graph-neural-network-for-airway-labelingFinally, a substantial set of experiments is reported to evaluate the performance of the algorithms and support the theoretical findings. The obtained results show that the proposed strategies approximate the theoretical distance for samples close to... |
| [v1880] | Adversarial Hallucination Engineering: Targeted Misdirection Attacks Against LLM Powered Security Operations Centers https://doi.org/10.20944/preprints202512.0913.v1Large Language Models (LLMs) are increasingly deployed in Security Operations Centers (SOCs) for alert triage and threat - intelligence synthesis. We study Adversarial Hallucination Engineering (AHE): attacks that bias LLM reasoning by introducing sm... |
| [v1909] | RSafe: Incentivizing proactive reasoning to build robust and adaptive LLM safeguards https://doi.org/10.48550/arXiv.2506.07736Its structure includes (1) 333,963 question-answer samples annotated with risk meta-labels spanning 14 harm types, and (2) 361,903 preference-based comparisons independently rating responses on helpfulness and harmlessness. Derived from over 16,000 a... |
| [v1915] | In 2025, public rules meet production reality: the EU AI Act sets penalties up to 7% of global turnover for certain violations, while customers expect transparent systems that show their work. https://themortonreport.com/blog/trustworthy-ai-a-step-by-step-guide-to-reliable-transparent-systems/Maintain an AI bill of materials that lists model versions, datasets, third-party components, and licenses. For suppliers, request security attestations and evaluation summaries, and plan tests to validate claims before integration. ISO/IEC 42001:20... |
| [v1977] | Counterfactual Explanations with Probabilistic Guarantees on their Robustness to Model Change https://arxiv.org/abs/2408.04842Abstract: Counterfactual explanations (CFEs) guide users on how to adjust inputs to machine learning models to achieve desired outputs. While existing research primarily addresses static scenarios, real-world applications often involve data or model ... |
| [v2010] | Democratizing ML for Enterprise Security: A Self-Sustained Attack Detection Framework https://doi.org/10.48550/arxiv.2512.08802Furthermore, LLMpowered agents show promise in improving the explainability of detection results and adapting to novel, zero-day attacks, which traditionally suffer from a lack of historical data . In dynamic threat environments, security models req... |
| [v2014] | Overfitting occurs when an AI model becomes so tightly tuned to its training dataset that it begins to "memorize" its noise, quirks, and outliers rather than learning generalizable patterns. https://www.c-sharpcorner.com/article/overfitting-in-ai-why-data-governance-is-the-key-to-smarter-more-reliable-mode/This oversight is crucial for avoiding the trap of "high accuracy" masking deeper flaws, such as overfitting, bias, or unethical decision-making. 4) Prevention Strategies Through Combined Governance Common technical strategies to reduce overfitting... |
| [v2016] | DRIFT: Divergent Response in Filtered Transformations for Robust Adversarial Defense https://arxiv.org/abs/2509.24359To assess whether our defense induces masking artifacts, we visualize the loss surface around input x along two random, orthonormal directions (u, v) in input space, plotting L(x + au + bv, y), (a, b) ∈ 2 , on a 41 41 grid with τ = 3/255.For stochas... |
| [v2044] | Agentic AI Framework for Smart Inventory Replenishment https://doi.org/10.48550/arXiv.2511.23366Jannelli et al. presented the agentic collaboration described by the authors as using LLM, which entails making consensusbased procurement decisions with the help of natural language arguments, which is a breakthrough in the direction of autonomous ... |
| [v2060] | The Architectural Evolution of Intelligence: A Formal Taxonomy of the AI Technology Stack https://www.c-sharpcorner.com/article/the-architectural-evolution-of-intelligence-a-formal-taxonomy-of-the-ai-technol/The World Wide Web Consortium (W3C) standards stack comprising the Resource Description Framework (RDF), RDF Schema (RDFS), and the Web Ontology Language (OWL) provides a mathematically grounded apparatus for representing entities, their properties, ... |
| [v2111] | What Is Agentic AI in Regulatory Operations? https://www.freyrsolutions.com/what-is-agentic-ai-in-regulatory-operationsImproved Audit Readiness: Maintains detailed audit trails and documentation aligned with regional and global authorities. Operational Efficiency: Reduces manual workload in regulatory affairs teams by up to 65%, freeing experts to focus on strategic... |
| [v2138] | Clinical Implementation of Artificial Intelligence in Endoscopy: A Human-Artificial Intelligence Interaction Perspective https://pubmed.ncbi.nlm.nih.gov/41572653/Regardless of the AI capabilities, the visualization quality and systematic inspection remain fundamental prerequisites, and traditional apprenticeship training cannot be replaced by technology. This review examines AI implementation in endoscopy fro... |
| [v2147] | DUE: Dynamic Uncertainty-Aware Explanation Supervision via 3D Imputation https://doi.org/10.1145/3637528.3671641Oring et al. proposed a regularization method that molds the latent space into a smooth, locally convex manifold consistent with training images. presents a method for interpolating between generative models of the StyleGAN architecture in a resolut... |
| [v2168] | Provenance Verification of AI-Generated Images via a Perceptual Hash Registry Anchored on Blockchain https://doi.org/10.48550/arXiv.2602.02412Future work could explore infrastructure-level interoperability, including shared governance models, standardized registry interfaces, or common cryptographic primitives, while maintaining strict separation between content provenance and identity ver... |
| [v2173] | Byzantine Robust Cooperative Multi-Agent Reinforcement Learning as a Bayesian Game https://doi.org/10.48550/arXiv.2305.12872In this study, we explore the robustness of cooperative multi-agent reinforcement learning (c-MARL) against Byzantine failures, where any agent can enact arbitrary, worst-case actions due to malfunction or adversarial attack. To address the uncertain... |
| [v2261] | Enhancing Network Intrusion Detection Systems: A Real-time Adaptive Machine Learning Approach for Adversarial Packet-Mutation Mitigation https://doi.org/10.1109/NCA61908.2024.00042We introduce an Adaptive Layered Mutation Algorithm (ALMA) for generating advanced adversarial examples and a runtime adaptive learning framework for real-time detection and response.... |
| [v2277] | This is just a glorified webhook wrapper around existing API calls. https://news.ysimulator.run/item/7241If one AI in the chain misreads intent or optimizes for the wrong objective, the user may not know until after the workspace has been altered. The real risk is not malicious use but emergent behavior in a system where responsibility is distributed an... |
| [v2296] | HEXAR: a Hierarchical Explainability Architecture for Robots https://arxiv.org/abs/2601.03070Finally, after executing f e , ∀e ∈ E s , the explainer selector must aggregate the set of explanations {x e |e ∈ E s } into a single explanation x if |E s | > 1. The aggregation method may be implemented in a number of ways, for example, using an ... |
| [v2306] | Large Language Models (LLMs) are revolutionary, but they have a fundamental limitation: their knowledge is frozen in time. https://www.remio.ai/post/rag-vs-cag-the-ultimate-guide-to-choosing-your-ai-s-knowledge-strategy-in-2026As the model processes this information, it creates an internal state representation from each of its self-attention layers. This captured state is called the Key-Value Cache, or KV Cache. The KV Cache is the model's encoded, digested form of your en... |
| [v2309] | F5 is a channel-led business, and we want to be crystal clear: the acquisition of CalypsoAI benefits our partners as much as it does our customers. https://www.f5.com/fr_fr/company/blog/q-and-a-with-lisa-citron-what-does-the-calypsoai-acquisition-mean-for-f5-partnersUsing adversarial attack simulation backed by the preeminent AI threat library, generating over 10,000 attack prompts per month, partners can deliver detailed insights for identifying vulnerabilities in real time. Furthermore, partners can help cust... |
| [v2406] | One strategy: Deploy GPT-5.2 for reasoning (100% AIME), Claude for coding (80.9% SWE-bench), Gemini Flash for speed (3x faster), Llama 4 for privacy (self-hosted), DeepSeek for scale (27x cheaper). https://www.adwaitx.com/ai-implementation-guide-2026-models-tools/One strategy: Deploy GPT-5.2 for reasoning (100% AIME), Claude for coding (80.9% SWE-bench), Gemini Flash for speed (3x faster), Llama 4 for privacy (self-hosted), DeepSeek for scale (27x cheaper). ... The breakthrough feature of 2026 models is adjus... |
| [v2439] | Less is More: Robust Zero-Communication 3D Pursuit-Evasion via Representational Parsimony https://arxiv.org/abs/2603.08273Abstract: Asymmetric 3D pursuit-evasion in cluttered voxel environments is difficult under communication latency, partial observability, and nonholonomic maneuver limits. While many MARL methods rely on richer inter-agent coupling or centralized sign... |
| [v2514] | Sentra-Guard: A Real-Time Multilingual Defense Against Adversarial LLM Prompts https://arxiv.org/abs/2510.22628Abstract: This paper presents a real-time modular defense system named Sentra-Guard. The system detects and mitigates jailbreak and prompt injection attacks targeting large language models (LLMs). The framework uses a hybrid architecture with FAISS-i... |
| [v2529] | InFoBERT: Zero-Shot Approach to Natural Language Understanding Using Contextualized Word Embedding https://doi.org/10.26615/978-954-452-072-4_025Jian-Guo Zhang, Kazuma Hashimoto, Chien-Sheng Wu, Yao Wan, S Philip, Richard Yu, Caiming Socher, Xiong, arXiv:1910.03544arXiv preprintJian-Guo Zhang, Kazuma Hashimoto, Chien-Sheng Wu, Yao Wan, Philip S Yu, Richard Socher, and Caiming Xiong. 2019. Fin... |
| [v2577] | Trustworthy Orchestration Artificial Intelligence by the Ten Criteria with Control-Plane Governance https://doi.org/10.48550/arXiv.2512.10304However, the standard operates at the management level without prescribing architectural properties that AI systems must exhibit, particularly for orchestrated, multi-component ecosystems where governance must be enforced as a runtime property rather... |
| [v2615] | OgbujiPT is a general-purpose knowledge bank system for LLM-based applications. https://pypi.org/project/OgbujiPT/It provides a unified API for storing, retrieving, and managing semantic knowledge across multiple backends, with support for dense vector search, sparse retrieval, hybrid search, and more.... |
| [v2616] | Regulation of algorithms https://en.wikipedia.org/?curid=63442371The GDPR's policy on the right of citizens to receive an explanation for algorithmic decisions highlights the pressing importance of human interpretability in algorithm design. In 2016, China published a position paper questioning the adequacy of exi... |
| [v2655] | Constrained Optimal Fuel Consumption of HEVs under Observational Noise https://arxiv.org/abs/2410.20913Z Lin, G Thomas, G Yang, T Ma, Advances in Neural Information Processing Systems. 202033173 Maximum entropy rl (provably) solves some robust rl problems. B Eysenbach, S Levine, arXiv:2103.062572021arXiv preprint Robust reinforcement learning as a s... |
| [v2689] | In an era where autonomous machines and connected systems are becoming integral to daily life, the question of how these systems can trust one another moves from theoretical curiosity to practical i https://bioengineer.org/building-trust-a-new-framework-to-enhance-safety-in-robot-and-vehicle-networks/Beyond laboratory studies, the research underscores the urgent need to embed cy-trust principles into policy and regulatory frameworks, particularly as autonomous systems rapidly transition from controlled environments to public domains. Cities are a... |
| [v2810] | Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks https://doi.org/10.18653/v1/2025.acl-long.476Our goal is to systematically vary the underlying communication structure, so we can quantify the impact of network topology on adversarial robustness.Experimental details are listed in Appendix B.4 The results for the ablation are summarized in Fig... |
| [v2828] | Originally when Clado was first started when it was still called Linkd, there was one database for each school with approximately 10k profiles per school. https://www.davidbshan.com/writings/building-sota-people-searchAgentic chunking experiments: using LLMs to summarize each profile into multiple semantic facets. Hybrid retrieval (sparse + dense): evaluating Milvus BM25 + vector hybrid search, and why query-term explosion and large-scale union merges became proh... |
| [v2830] | Controllable Stylistic Text Generation with Train-Time Attribute-Regularized Diffusion https://arxiv.org/abs/2510.06386Improving diffusion models inverse problems using manifold constraints. Hyungjin Chung, Byeongsu Sim, Dohoon Ryu, Jong Chul, Ye , Advances in Neural Information Processing Systems. 202235 Diffusion models beat gans on image synthesis. Prafulla Dhari... |
| [v2853] | Posted on Mar 23 Originally published at blckalpaca. https://dev.to/blckalpaca/llm-landscape-2026-the-enterprise-decision-guide-eu-compliant-153lThe DACH region faces particularly complex challenges: EU AI Act high-risk obligations take effect August 2026, GDPR enforcement for AI is intensifying, and German, Austrian, and Swiss regulators are each building distinct national frameworks. The 2... |
| [v2861] | Modeling eye gaze velocity trajectories using GANs with spectral loss for enhanced fidelity https://doi.org/10.1038/s41598-025-05286-5This study introduces a Generative Adversarial Network (GAN) framework employing Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN) generators and discriminators to generate high-fidelity synthetic eye gaze velocity trajectories. We... |
| [v2879] | MAGIC-MASK: Multi-Agent Guided Inter-Agent Collaboration with Mask-Based Explainability for Reinforcement Learning https://arxiv.org/abs/2510.00274Agents use it to steer exploration by deprioritizing perturbations in states that are visually or semantically similar to those already marked as critical by peers, which reduces redundancy and increases behavioural diversity. The protocol operates i... |
| [v2884] | The era of asking a single chatbot a question and receiving a static response is rapidly coming to an end. https://fueler.io/blog/the-complete-guide-to-multi-agent-systems-in-artificial-intelligenceIncreased Execution Time and Latency: Because multi-agent workflows involve multiple steps and decision-making gates, they take longer to complete than single queries, which can be a drawback for applications requiring instant responses. Why it matt... |
| [v2937] | Second Order Optimization for Adversarial Robustness and Interpretability https://arxiv.org/abs/2009.04923The condition that the Hessian of the loss, H, be positive semi-definite has been shown to hold locally for all x, excluding a set of measure 0, when the network uses ReLU activations and the loss is categorical cross entropy (Singla et al. 2019). C... |
| [v2941] | Performance-Aware Self-Configurable Multi-Agent Networks: A Distributed Submodular Approach for Simultaneous Coordination and Network Design https://doi.org/10.48550/arxiv.2409.01411But ActionCoordination incurs a suboptimality cost C({N i } i∈N ) due to requiring the agents to coordinate exchanging local information only, prohibiting also multi-hop communication, in favor of decision speed.For this reason, given the agents' ban... |
| [v2988] | Federated Learning Paper in Conferences https://github.com/weimingwill/awesome-federated-learning/blob/master/conferences.mdTowards Model Agnostic Federated Learning Using Knowledge Distillation Diurnal or Nocturnal? Federated Learning of Multi-branch Networks from Periodically Shifting Distributions Recycling Model Updates in Federated Learning: Are Gradient Subspaces Lo... |
| [v3006] | Multi-model assurance analysis showing large language models are highly vulnerable to adversarial hallucination attacks during clinical decision support https://pubmed.ncbi.nlm.nih.gov/40753316/We embedded fabricated content in clinical prompts to elicit adversarial hallucination attacks in multiple large language models.... |
| [v3192] | Time Series Forecasting with Missing Data Using Generative Adversarial Networks and Bayesian Inference https://doi.org/10.3390/info15040222We propose a novel framework that combines the strengths of Generative Adversarial Networks (GANs) and Bayesian inference.... |
| [v3219] | Which prompting technique can protect against prompt injection attacks? https://www.ace4sure.com/aif-c01/which-prompting-technique-can-protect-against-prompt-question-answer.htmlAdversarial prompting helps uncover and mitigate these risks before deployment. Explanation of other options: B. Zero-shot prompting provides no examples and does not protect against injection attacks. C. Least-to-most prompting is a reasoning tec... |
| [v3255] | Multi-Agent Reinforcement Learning (MARL) is a rapidly evolving field that promises dynamic solutions for complex tasks within multi-agent systems (MAS) 1. https://atoms.dev/insights/multi-agent-reinforcement-learning-for-coding-foundations-applications-challenges-and-future-directions/2d27a831498a42fb91e22937bd6b95fcInterpretability and Explainability: Ensuring that the actions and recommendations of MARL agents are understandable and transparent to human developers is crucial for trust and effective collaboration . Further work is needed to trace decisions in c... |
| [v3261] | Pruning the parameters of deep neural networks has generated intense interest due to potential savings in time, memory and energy both during training and at test time. https://aiqianji.com/blog/article/4013GraSP is a more recent algorithm that aims to preserve gradient flow at initialization by scoring weights based on the Hessian-gradient product.... |
| [v3333] | Generalized Per-Agent Advantage Estimation for Multi-Agent Policy Optimization https://arxiv.org/abs/2603.02654This scheme improves credit assignment for off-policy trajectories by balancing sensitivity to the agent's own policy changes with robustness to non-stationarity from other agents. Experiments on benchmarks demonstrate that our approach outperforms e... |
| [v3338] | Abstract: AI safety and alignment research has predominantly been focused on methods for safeguarding individual AI systems, resting on the assumption of an eventual emergence of a monolithic AGI. Th https://www.emergentmind.com/papers/2512.16856Reputation system manipulation: No formal model of collusion-resilient and gaming-resistant reputation; develop aggregation rules, decay functions, and anomaly detectors robust to strategic rating attacks and venue-hopping. Collusion detection (expl... |
| [v3355] | Multi-Stakeholder Alignment in LLM-Powered Collaborative AI Systems: A Multi-Agent Framework for Intelligent Tutoring https://doi.org/10.48550/arxiv.2510.23245This dual representation supports both machine processing and human interpretability.A version control system tracks all policy modifications, ensuring a complete audit trail of how governance requirements evolve over time.... |
| [v3394] | Discovering Concept Directions from Diffusion-based Counterfactuals via Latent Clustering https://arxiv.org/abs/2505.07073Among the various XAI paradigms, concept-based explanations have gained particular attention due to their ability to express model behavior in terms of high-level, semantically meaningful concepts, rather than low-level feature weights or pixel-base... |
| [v3396] | Trusted Data for AI Agents: Enterprise Foundation for Governance, Quality and Scale https://www.informatica.com/resources/articles/trusted-data-for-ai-agents-guide.htmlRegulatory requirements (GDPR, HIPAA, SOC 2) demand strict access controls, masking, lineage and auditability. In multi-agent systems, agent-specific accountability quickly becomes complicated without centralized governance. Governance by design. Ef... |
| [v3402] | BEM: Training-Free Background Embedding Memory for False-Positive Suppression in Real-Time Fixed-Background Camera https://arxiv.org/abs/2604.11714BEM estimates clean background embeddings, maintains a prototype memory, and re-scores detection logits with an inverse-similarity, rank-weighted penalty, effectively reducing false positives while maintaining recall. Empirically, background-frame co... |
| [v3453] | Artificial Intelligence (AI) is becoming a crucial part of almost every industry. https://www.validaitor.com/post/understanding-the-basics-of-ai-testingMetamorphic and Property-Based Testing: AI systems often lack a clear test oracle (i.e., a known correct output). Metamorphic testing addresses this by checking whether the system behaves consistently under known transformations (e.g., image rotation... |
| [v3495] | Agentic AI pipelines are computational architectures where multiple specialized AI agents collaborate to complete complex tasks. https://www.exxactcorp.com/blog/deep-learning/agentic-ai-platforms-hardware-infrastructureAgentic AI pipelines are computational architectures where multiple specialized AI agents collaborate to complete complex tasks. ... This architecture is governed by a set of key principles designed to ensure scalability, security, and manageability:... |
| [v3561] | Secure Control of Connected and Automated Vehicles Using Trust-Aware Robust Event-Triggered Control Barrier Functions https://doi.org/10.14722/vehiclesec.2024.23037Secure Control of Connected and Automated Vehicles Using Trust-Aware Robust Event-Triggered Control Barrier Functions --- 8} within the time interval [t i,k , t i,k+1 ) renders the set Ci and therefore C i forward invariant for the dynamic system def... |
| [v3577] | On Minimizing Adversarial Counterfactual Error in Adversarial Reinforcement Learning https://arxiv.org/abs/2406.04724Deep Reinforcement Learning (DRL) policies are highly susceptible to adversarial noise in observations, which poses significant risks in safety-critical scenarios. The challenge inherent to adversarial perturbations is that by altering the informatio... |
| [v3604] | Efficient LLM Safety Evaluation through Multi-Agent Debate https://arxiv.org/abs/2511.06396Sensitivity to rubric design, prompting context, and model-specific inductive biases yields poor inter-judge reliability and complicates alignment with human values, especially under semantic and adversarial conditions .These observations motivate ou... |
| [v3635] | Responsible AI in Customer Service: Guidelines https://customerscience.com.au/customer-experience-2/responsible-ai-customer-service-guidelines/A purpose-built option is brand-aligned communication quality scoring with CommScore.AI. NIST. AI RMF Generative AI Profile. NIST AI 600-1, 2024. https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.600-1.pdf ISO/IEC. ISO/IEC 42001:2023 Artificial intellig... |
| [v3666] | Sparsity-Aware Unlearning for Large Language Models https://doi.org/10.48550/arXiv.2602.00577However, existing methods are designed for dense models and overlook model sparsification-an essential technique for efficient LLM deployment. We find that unlearning effectiveness degrades substantially on sparse models. Through empirical analysis, ... |
| [v3671] | Multi-Abstractive Neural Controller: An Efficient Hierarchical Control Architecture for Interactive Driving https://doi.org/10.1109/lra.2023.3273421We train this neural controller with real-world driving data via behavior cloning and show improved explainability, sample efficiency, and similarity to human driving. I. INTRODUCTION With robotic and autonomous driving applications expanding from ... |
| [v3855] | Greetings and welcome to the third edition of "Weekly AI News"! https://newsletter.chatwhisperer.ai/p/weekly-ai-news-110225OpenAI now offers European data residency, helping local organisations comply with GDPR, Germany's Federal Data Protection Act, and other privacy regulations. Eligible API endpoints, plus new ChatGPT Enterprise and Edu accounts, can store data at res... |
| [v3946] | System and method for privately hosting machine learning models and collaborative computations https://patents.google.com/?oq=18899444... run, by the encrypted file system, a hardware attestation report comprising a cryptographically signed statement validating that the model host is running on a genuine processor manufactured by an enclave manufacturer with a secure compute elemen... |
| [v3950] | Spindle supports trust-weighted defeasible reasoning, enabling source attribution, trust-weighted conclusions, partial defeat (diminishment), and multi-perspective evaluation. https://spindle-rust.anuna.io/guides/trust... d flies (trust: 0.90) [agent:coder] Each conclusion shows: The provability symbol (+D, -D, +d, -d) The literal The trust degree in parentheses The contributing sources in brackets Without --trust, conclusions display in the standard format ... |
| [v4009] | STAR-Teaming: A Strategy-Response Multiplex Network Approach to Automated LLM Red Teaming https://arxiv.org/abs/2604.18976In the following sections, we detail each part of the framework: Section 3.2 describes the MAS pipeline, Section 3.3 explains the construction of the multiplex network, and Section 3.4 outlines the probabilistic strategy sampling procedure. Multi Age... |
| [v4152] | Discover IIT Bombay's new Agentic AI Certificate and access the program through Great Learning to build practical AI agent development skills. https://www.mygreatlearning.com/blog/access-the-agentic-ai-certificate-course-on-great-learning/Discover IIT Bombay's new Agentic AI Certificate and access the program through Great Learning to build practical AI agent development skills. ... Reinforcement learning and reward training Prompt optimisation using DSPy Best-of-N sampling and feed... |
| [v4162] | REMIX-FND: A Multi-Modal Domain-Invariant Framework with Adaptive Evidence Retrieval for Cross-Domain Fake News Detection https://doi.org/10.66261/817fqh85In addition, Monte Carlo dropout is employed for uncertainty-conditioned evidence retrieval depth, a Dynamic Source Reliability Graph (DSRG) for temporally decaying source reliability, and a six-detector ensemble for AI-generated text detection. The ... |
| [v4238] | FLARE: Adaptive Multi-Dimensional Reputation for Robust Client Reliability in Federated Learning https://arxiv.org/abs/2511.14715The server performs the entire multi-dimensional reputation assessment Section III-B and dynamic thresholding III-C on these noisy updates. This introduces a clear privacy-utility trade-off: the server's scoring mechanism must now distinguish between... |
| [v4257] | VectorSmuggle: Steganographic Exfiltration in Embedding Stores and a Cryptographic Provenance Defense https://arxiv.org/abs/2605.13764VectorSmuggle: Steganographic Exfiltration in Embedding Stores and a Cryptographic Provenance Defense --- Abstract: Modern retrieval-augmented generation (RAG) systems convert sensitive content into high-dimensional embeddings and store them in vecto... |
| [v4260] | Beyond Black-Box Explanations: Monte Carlo Dropout for Uncertainty-Aware Explainable AI in Marketing Analytics https://doi.org/10.1109/EECSI67060.2025.11290147Marketing AI systems increasingly rely on explainable artificial intelligence (XAI) to justify customer targeting, yet current methods provide no indication of when explanations can be trusted, creating risks of unreliable targeting and reduced campa... |
| [v4266] | Fugu-MT 論文翻訳(概要): When and Where to Attack? https://fugumt.com/fugumt/paper_check/2602.04356v1Language Models)に対する敵対的攻撃は 現代のマルチモーダルシステムにおける安全性の脆弱性を明らかにするために重要である。 ランダムトリミングのような入力変換に基づく最近の攻撃は 空間的局所的な摂動は 大域的な画像操作よりも効果的であることを示唆している。 しかし 画像全体をランダムにトリミングすることは本質的に確率的であり ピクセルごとの摂動予算を効率的に使うことができない。 私たちは2つの重要な観察をします。 (i)地域注意スコアは 対向的損失感度と正の相関関係にあり (II)... |
| [v4281] | Quick Recap: Embeddings (vectors) are numerical representations of meaning. "" https://newsletter.aitechhive.com/p/vectorization-and-enterprise-indexing-theoryFail: <85% overlap indicates model is missing cases or including wrong ones By 2026, all financial institutions will run these validation tests quarterly. Embeddings that fail are retrained or replaced. Regulatory and Practical Context How Regulat... |
| [v4285] | LLM-assisted Agentic Edge Intelligence Framework https://arxiv.org/abs/2604.09607To enhance system robustness and security, a dedicated component is introduced to validate faulty business logic, developed by LLMs, before further processing. 3. Our proposed framework is adaptive in nature, which generates lightweight code and cons... |
| [v4426] | Robust Explainable AI via Adversarial Latent Diffusion Models: Mitigating Gradient Obfuscation with Interpretable Feature Attribution https://doi.org/10.52783/jisem.v10i36s.6522For explanation generation, Integrated Gradients was employed to produce interpretable feature attributions. The models were evaluated based on adversarial robustness, explanation stability (measured by Structural Similarity Index Measure, SSIM), and... |
| [v4465] | When to Re-embed Documents in Your Vector Database https://particula.tech/blog/when-to-reembed-documents-vector-databaseThe most common reason to re-embed is switching to a more capable embedding model. If you initially implemented RAG with text-embedding-ada-002 and now want to use text-embedding-3-large, you need to re-embed all existing documents. Mixing embeddings... |
| [v4527] | Counterfactual Visual Explanation via Causally-Guided Adversarial Steering https://doi.org/10.48550/arXiv.2507.09881To the best of our knowledge, no existing method well addresses these challenges, underscoring the need for a new approach that incorporates causal reasoning into the generation of counterfactual visual explanations. To address the aforementioned cha... |
| [v4568] | Medium Voltage Direct Current Shipboard Power Network Reconfiguration Using Graph-Based Reinforcement Learning https://doi.org/10.1115/1.4069035The RL policy network is designed using a graph convolutional network (GCN). This technique optimizes the optimal status (ON/OFF) of switches in the MVDC shipboard power network, ensuring maximum power availability to loads during disruptive events s... |
| [v4581] | Agentic Artificial Intelligence (AI) Orchestration And Memory Systems Market to Reach $37.11B by 2030 at 40.2% CAGR https://www.einpresswire.com/article/909620759/agentic-artificial-intelligence-ai-orchestration-and-memory-systems-market-to-reach-37-11b-by-2030-at-40-2-cagrThe agentic artificial intelligence (AI) orchestration and memory systems market is segmented by solution type into orchestration frameworks, memory layers or vector databases (DBs), workflow engines, context-management software development kits (SDK... |
| [v4628] | Understanding disentangling in β-VAE https://arxiv.org/abs/1804.03599It is a modification of the Variational Autoencoder (VAE) objective, a generative approach that aims to learn the joint distribution of images x and their latent generative factors z. β-VAE adds an extra hyperparameter β to the VAE objective, which ... |
| [v4684] | Beyond Single-Point Judgment: Distribution Alignment for LLM-as-a-Judge https://doi.org/10.48550/arxiv.2505.12301These results suggest that incorporating adversarial training enables the model to effectively align with all plausible distributions within the perturbation set, thereby improving robustness and fidelity in distributional alignment. Conclusion In ... |
| [v4783] | The Specialized High-Performance Network on Anton 3 - NewsBreak https://www.newsbreak.com/news/2491549896545/the-specialized-high-performance-network-on-anton-3URL: Backdoor Defense with Machine Unlearning - https://newsbreak.com/news/2494719563784/backdoor-defense-with-machine-unlearning URL: Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution ... |
| [v4801] | Mechanistic understanding and validation of large AI models with SemanticLens https://doi.org/10.1038/s42256-025-01084-w'Auditing concept alignment with expected reasoning' describes how these functionalities provide the basis for effectively auditing the alignment of the reasoning of the model with respect to human expectation. We demonstrate how to spot flaws in med... |
| [v4846] | HyperTrust-Fog: Hypergraph-Based Trust-Aware-Federated Orchestration with Energy Adaptive Scheduling for Hierarchical Cloud Fog Edge Systems https://doi.org/10.21203/rs.3.rs-8230509/v1It begins from the observation that many existing federated learning (FL) or graph-based orchestration methods rely on pairwise interaction models and largely static trust assumptions. Such systems are inadequate for fog environments where collaborat... |
| [v4851] | A multi-label visualisation approach for malware behaviour analysis https://doi.org/10.1038/s41598-025-21848-zTo improve attribution reliability, we extend Gradient-weighted Class Activation Mapping (Grad-CAM) with a Bayesian formulation, enabling uncertainty-aware visualisation of discriminative regions linked to multiple categories. The regions identified ... |
| [v4896] | Introducing Dataset Q&A: Expanding natural language querying for structured datasets in Amazon Quick https://aws.amazon.com/blogs/machine-learning/introducing-dataset-qa-expanding-natural-language-querying-for-structured-datasets-in-amazon-quick/Users can explore any dataset directly, going beyond what an author has pre-configured, while all the security, permissions, and governance that enterprises expect from Quick remain fully enforced. While the industry has raced to ship text-to-SQL de... |
| [v4930] | Actual costs may vary based on tokenization and usage patterns. https://calculatequick.com/ai/claude-token-cost-calculator/Opus 4.5 introduces fine-grained control over reasoning depth. The effort parameter lets you balance performance versus cost on each API request. Low Effort Fastest responses with minimal reasoning depth. Best for simple tasks, quick classification... |
| [v4945] | How Much Does It Cost to Make A Crypto Wallet App on Blockchain? https://appinventiv.com/blog/ai-software-development-uae/Filtering or masking sensitive fields before model access Security Is Built Into the Architecture AI introduces new risk surfaces, from prompt inputs to downstream integrations. In AI-powered software development in Dubai, security is not treated a... |
| [v4973] | System And Method For Website Analysis Using Computer Vision https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260120500).pnThe system demonstrates improved performance characteristics compared to traditional DOM-based web scraping approaches. In empirical testing across diverse website types, the visual analysis approach maintained consistent extraction accuracy despite ... |
| [v5000] | Deep learning emerges as key shield for smart grid cybersecurity | Technology https://www.devdiscourse.com/article/technology/3340328-deep-learning-emerges-as-key-shield-for-smart-grid-cybersecurityHowever, FL itself introduces communication overhead and is still susceptible to poisoning attacks, where malicious nodes feed deceptive data into the learning process. Legacy system compatibility is another roadblock. Many current grid systems were... |
| [v5002] | In this paper, we focus on applications in machine learning, optimization, and control that call for the resilient selection of a few elements, e.g. features, sensors, or leaders, against a number of https://core.ac.uk/search/In general, such resilient optimization problems are hard, and cannot be solved exactly in polynomial time, even though they often involve objective functions that are monotone and submodular.... |
| [v5037] | Beyond Binary Opinions: A Deep Reinforcement Learning-Based Approach to Uncertainty-Aware Competitive Influence Maximization https://doi.org/10.48550/arxiv.2504.15131The belief ( bi ) and disbelief ( di ) are then recalibrated by subtracting their respective contributions to uncertainty, maintaining the overall probability distribution. We incorporate this UM in designing uncertainty-aware exploration-exploitati... |
| [v5041] | Why Сurrent LLMs Struggle to Integrate with Complex Data Lakes in Multi-agent Systems https://techbullion.com/why-%D1%81urrent-llms-struggle-to-integrate-with-complex-data-lakes-in-multi-agent-systems/Column-based security restricts access to sensitive fields. Policy Awareness. LLMs lack an inherent understanding of column-level permissions and may retrieve restricted columns from LLM Chat Memory without guardrails. Metadata Exploitation . Attac... |
| [v5061] | Orchestrator-Agent Trust: A Modular Agentic AI Visual Classification System with Trust-Aware Orchestration and RAG-Based Reasoning https://doi.org/10.48550/arXiv.2507.10571In summary, our contributions are fourfold: (1) A modular agentic AI system that decouples perception, reasoning, and retrieval; (2) a novel trust-aware orchestration strategy grounded in multidimensional calibration; (3) a CLIP-RAG-based re-evaluati... |
| [v5065] | RevenueGrid Blog All resources AI Readiness Checklist for FinServ: Are You Ready for AI Adoption? https://revenuegrid.com/blog/ai-readiness-checklist-finserv/Automated PII detection runs before an LLM processes any data; masking or tokenization is applied by default. Role-based access control enforces least-privilege access for both users and AI assistants. Model Risk Classification Tiered model invento... |
| [v5088] | Explanation of Dynamic Physical Field Predictions using WassersteinGrad: Application to Autoregressive Weather Forecasting https://arxiv.org/abs/2604.22580It is also interesting to remark that gradient-based techniques such as SmoothGrad are now standard on images to robustify the explanations using pointwise averages of the attribution maps obtained from several noised inputs. Our goal is to efficient... |
| [v5150] | Following our successful HULA framework workshops, we evolved the concept at Founders & Coders to explore a different challenge: how do development teams coordinate when each developer has their own https://www.maxitect.blog/posts/beyond-solo-ai-how-pair-programming-with-claude-code-transforms-team-developmentTeams following this approach progressed smoothly through feature development whilst those attempting full AI delegation found themselves rebuilding foundations as teammates moved ahead. Why live documentation tumps individual context The TICKETS.m... |
| [v5187] | Matrix Control Barrier Functions https://arxiv.org/abs/2508.11795Matrix Control Barrier Functions --- a method increasingly used in robotics in fields such as SLAM, pose graph optimization, and sensor fusion. One recent work has begun to explore how control barrier functions can be used to ensure NLS remains well... |
| [v5212] | The Student Seminar Series is a student-operated platform where graduate students can present their research to their peers and practice their presentation skills and faculty have an opportunity to https://uwaterloo.ca/statistics-and-actuarial-science/student-seminar-seriesThe Student Seminar Series is a student-operated platform where graduate students can present their research to their peers and practice their presentation skills and faculty have an opportunity to present their research to a student audience. ... Ph... |
| [v5233] | Batch reinforcement learning, also called offline reinforcement learning, is the process of training an RL policy using a fixed dataset of interactions collected beforehand, without further environme https://www.shadecoder.com/topics/batch-reinforcement-learning-a-comprehensive-guide-for-2025When possible, integrate explainability and logging to trace policy decisions back to data. Overall, the process is iterative: success depends on data quality, conservative design, and disciplined offline validation. Common Mistakes with Batch Reinf... |
| [v5245] | Assessing the Impact of Requirement Ambiguity on LLM-based Function-Level Code Generation https://arxiv.org/abs/2604.21505Even state-of-the-art models, such as GPT-4, exhibit a performance drop exceeding 30% when confronted with ambiguous specifications, suggesting that current benchmarks significantly overestimate the effectiveness of LLMs in real-world, "noisy" softwa... |
| [v5355] | TriGuard: Testing Model Safety with Attribution Entropy, Verification, and Drift https://doi.org/10.48550/arxiv.2506.14217TriGuard draws upon and extends foundational research across adversarial robustness, formal verification, and interpretability.Our contribution lies in unifying these efforts under a shared evaluation framework and proposing a novel metric -Attributi... |
| [v5422] | Multi-Modal Fact-Verification Framework for Reducing Hallucinations in Large Language Models https://doi.org/10.48550/arXiv.2510.22751This hallucination problem has become a major barrier to deploying these models in real-world applications where accuracy matters. We developed a fact verification framework that catches and corrects these errors in real-time by cross checking LLM ou... |
| [v5423] | Visual Disentangled Diffusion Autoencoders: Scalable Counterfactual Generation for Foundation Models https://doi.org/10.48550/arXiv.2601.21851The oracle O is just another classifier that we distill the decision strategy of our original classifier f into. Because we train O from scratch, this avoids the weight-specific adversarial attacks that fool f also fool O. Gain To quantify the effect... |
| [v5472] | When outcomes carry risk-legal exposure, investment loss, or reputational damage-'good enough' AI isn't good enough. https://suprmind.ai/hub/insights/autonomous-ai-agents-a-practitioners-guide-to-multi-llm/This includes user preferences, domain knowledge, and patterns learned from previous interactions. Context Fabric maintains this persistent context without requiring you to manually track conversation history. The challenge is managing context windo... |
| [v5481] | For AI safety researchers: Focus on Section II. https://aliveness.kunnas.com/articles/privilege-separation-ai-safetyAdversarial dynamic: Research on Chain of Thought Monitorability (Korbak et al. 2024) finds this approach "fragile" - models hide reasoning when optimization pressure favors it. Timeline mismatch: Scalable mechanistic interpretability estimated at 1... |
| [v5523] | Predicting the epidemiological trend of acute hemorrhagic conjunctivitis in China using Bayesian structural time-series model https://doi.org/10.1038/s41598-024-68624-zThe Bayesian Time Structure Sequence (BSTS), on the other hand, is a dynamic regression model that allows parameters to evolve over time, accurately capturing the random behavior of time series.This approach allows for variance control and the imposi... |
| [v5532] | Structure suggests 10040.5ImportanceReferenceImportance: 40.5/100How central this topic is to AI safety. https://www.longtermwiki.com/wiki/E174The suite combines SAEs and transcoders to enable analysis of complex multi-step behaviors including jailbreaks, refusal mechanisms, and chain-of-thought faithfulness. Quantitative Progress Metrics Quantitative progress has accelerated dramatically... |
| [v5546] | Artificial intelligence agents in healthcare research: A scoping review https://doi.org/10.1371/journal.pone.0342182The COVID-19 pandemic catalyzed the adoption of remote care modalities, creating an urgent need for digital tools capable of sustaining patient engagement and clinical continuity without physical contact .Concurrently, the maturation of large languag... |
| [v5547] | Amortized Latent Steering: Low-Cost Alternative to Test-Time Optimization https://doi.org/10.48550/arXiv.2509.18116Test-time optimization remains impractical at scale due to prohibitive inference costs\textemdash techniques like iterative refinement and multi-step verification can require $10$--$100\times$ more compute per query than standard decoding. Latent spa... |
| [v5569] | RAIN: Secure and Robust Aggregation under Shuffle Model of Differential Privacy https://arxiv.org/abs/2603.03108Secure aggregation is a foundational building block of privacy-preserving learning, yet achieving robustness under adversarial behavior remains challenging. ... Overall, these results indicate that signspace representation effectively lowers client-s... |
| [v5583] | The pervasive influence of recommender systems across digital landscapes necessitates continuous innovation to overcome inherent limitations and enhance user experience. https://creativenews.io/research-reports/advancements-in-social-trust-integration-for-recommender-systems-a-comprehensive-review/Recommendations are then generated by aggregating ratings from trusted users, weighted by this propagated trust score. MoleTrust (Massa & Avesani, 2007): Similar to TidalTrust, MoleTrust also considers trust propagation but emphasizes the local prop... |
| [v5586] | Tiny-Critic RAG: Empowering Agentic Fallback with Parameter-Efficient Small Language Models https://doi.org/10.48550/arxiv.2603.00846Retrieval-Augmented Generation (RAG) grounds Large Language Models (LLMs) to mitigate factual hallucinations. ... RAGAS Faithfulness.b CPQ: Explicit routing Cost Per 10k Queries in USD.c CPQ estimations assume an average context of 2K tokens under op... |
| [v5599] | Traditional reinforcement learning-based robotic control methods are often task-specific and fail to generalize across diverse environments or unseen objects and instructions. https://aclanthology.org/people/deepanway-ghosal/unverified/In this work, we propose the Embodied Multimodal Action Model with Grounded Chain of Thought and Look-ahead Spatial Reasoning, EMMA-X. EMMA-X leverages our constructed hierarchical embodiment dataset based on BridgeV2, containing 60,000 robot manipul... |
| [v5635] | SCI-IoT: A Quantitative Framework for Trust Scoring and Certification of IoT Devices https://arxiv.org/abs/2511.1804512]. The following section outlines the major vulnerability classes, associated real world incidents, and the corresponding mitigation expectations aligned with Grades A-F of the proposed certification framework. Insecure Communication Protocols L... |
| [v5668] | RzkFL: a Verifiable, Fast and Privacy-Preserving Framework for Federated Learning Inference Using Recursive Zero-Knowledge Proofs and on-Chain Verification https://doi.org/10.1109/blockchain67634.2025.00028RzkFL: a Verifiable, Fast and Privacy-Preserving Framework for Federated Learning Inference Using Recursive Zero-Knowledge Proofs and on-Chain Verification... |
| [v5695] | Goodhart's Law Applies to NLP's Explanation Benchmarks https://doi.org/10.18653/v1/2024.findings-eacl.88Slack et al. demonstrate how one could exploit the OOD issue to manipulate the feature importance ranking from LIME and SHAP and conceal problems vis-a-vis fairness.They propose an adversarial wrapper classifier designed such that a sensitive featur... |
| [v5720] | FedRio: Personalized Federated Social Bot Detection via Cooperative Reinforced Contrastive Adversarial Distillation https://arxiv.org/abs/2604.10678We first introduce an adaptive message-passing module as the graph neural network backbone for each client. To facilitate efficient knowledge sharing of global data distributions, we design a federated knowledge extraction mechanism based on generati... |
| [v5732] | PolySwarm: A Multi-Agent Large Language Model Framework for Prediction Market Trading and Latency Arbitrage https://arxiv.org/abs/2604.03888PolySwarm system design and implementation: a production-ready multi-agent LLM trading terminal deploying 50 diverse personas on Polymarket with full architectural description, asynchronous execution pipeline, and paper/live trading modes. Confidence... |
| [v5769] | MSDA-GDS: A Dual-Branch Hybrid Federated Explainable Deep Learning Framework for CAN Bus Intrusion Detection in Internet of Vehicles https://doi.org/10.19139/soic-2310-5070-3599The framework integrates Apache Spark-accelerated preprocessing, FedProx federated learning with differential privacy, and multi-method explainability (SHAP, LIME, gradient saliency).... |
| [v5815] | Use the AI STAR Method Generator to produce structured behavioral interview diagrams in seconds. https://creately.com/diagram/example/3KKZufKnFz8/ai-star-interview-method-templateGenerate audit-ready reports, trace decision rationale, and maintain secure logs to meet GDPR and SOC 2 Type 2 requirements.... |
| [v5831] | Generative artificial intelligence in diabetes healthcare https://doi.org/10.1016/j.isci.2025.113051This can be achieved by enforcing temporal ordering, integrating structural causal models, or training on interventional and counterfactual data. In this context, graph-based techniques such as Graph Neural Networks (GNNs) provide powerful tools for ... |
| [v5920] | A Framework for Modeling Cognitive Processes in Intelligent Agents Using Behavior Trees https://doi.org/10.1145/3749566.3749619In this way, we use an exploration technique based on pairing a combined behavior tree with the target model. We empirically show that our framework is effective in four benchmark MARL domains. Moreover, the results of a user study show that the gene... |
| [v6008] | SoK: Security of Autonomous LLM Agents in Agentic Commerce https://arxiv.org/abs/2604.15367A critical finding of our analysis is that the most dangerous attacks on autonomous financial agents exploit crosslayer interactions, where a vulnerability at one layer triggers a cascading failure at another.We identify and characterize all 12 cross... |
| [v6031] | MedMMV: A Controllable Multimodal Multi-Agent Framework for Reliable and Verifiable Clinical Reasoning https://doi.org/10.48550/arXiv.2509.24314By controlling instability through a verifiable, multi-agent process, our framework provides a robust path toward deploying trustworthy AI systems in high-stakes domains like clinical decision support.... |
| [v6049] | AW-GATCN: Adaptive Weighted Graph Attention Convolutional Network for Event Camera Data Joint Denoising and Object Recognition https://doi.org/10.1109/IJCNN64981.2025.11227212For noise reduction, inspired by , we employ an adaptive algorithm that dynamically adjusts the weighting radius based on multiple event point features, filtering out noise. These weights are then integrated with a graph attention mechanism to select... |
| [v6164] | Emerging multi-robot systems rely on cooperation between humans and robots, with robots following automatically generated motion plans to service application-level tasks. https://doi.org/10.48550/arxiv.2301.10704Distributed resilient submodular action selection in adversarial environments. IEEE Robotics and Automation Letters 6, 3 (2021), 5832-5839. [Morante et al.(2015)] Santiago Morante, Juan G Victores, and Carlos Balaguer. 2015. Cryptobotics: Why robots ... |
| [v6171] | What does it mean to connect unstructured data in a vector database to an LLM in a RAG pipeline? https://airbyte.com/data-engineering-resources/connecting-vector-database-to-llm-in-rag-pipelineAlign them with your corpus and serving constraints. Retrieval tactics: similarity search vs hybrid approaches Vector similarity search finds semantically close chunks from embeddings. Hybrid retrieval combines semantic vectors with lexical methods... |
| [v6219] | この記事を一言で要約すると 反実仮想的な説明に基づく機械学習モデル解釈手法に対する Microsoft Research の取り組みと その成果 (アルゴリズム) を८ https://qiita.com/OpenJNY/items/ef885c357b4e0a1551c0Support for other algorithms for generating counterfactual explanations Incorporating causal constraints when generating counterfactual explanations 機械学習モデルの解釈手法も成熟してきつつあり 原先生 の Lasso 解列挙手法 [AAAI 2017] のような 解釈した先の意識決定を意識するフェーズに来ているのかなと思いました。 そのような... |
| [v6223] | Method and apparatus for combining data to construct a floor plan https://patents.google.com/?oq=17876634The gradient ∇ƒ(x) of the function ƒ(x) may be a vector including all first partial derivatives. The matrix including all first partial derivatives may be the Jacobian while the matrix including all the second derivatives may be the Hessian, (2023)... |
| [v6236] | Explaining Hypergraph Neural Networks: From Local Explanations to Global Concepts https://doi.org/10.48550/arXiv.2410.07764The implanted motifs reflect human reasoning, but are not necessarily faithful to the neural network, which may instead rely on a variant or correlate of the motif. Rather, a good explanation should provide users information about the hyperGNN's pred... |
| [v6260] | GitHub - tigerneil/awesome-deep-rl: For deep RL and the future of AI. https://github.com/tigerneil/awesome-deep-rlLanguage as an Abstraction for Hierarchical Deep Reinforcement Learning 18 Jun 2019 arxiv Variational Option Discovery Algorithms 26 July 2018 A Laplacian Framework for Option Discovery in Reinforcement Learning 16 Jun 2017 Robust Imitation of Div... |
| [v6270] | Gaussian Amplitude Amplification for Quantum Pathfinding https://pubmed.ncbi.nlm.nih.gov/35885186/We study an oracle operation, along with its circuit design, which combined with the Grover diffusion operator boosts the probability of finding the minimum or maximum solutions on a weighted directed graph. We focus on the geometry of sequentially c... |
| [v6280] | A take on a new threat from an old adversaryYou're already thinking about compliance - is digital accessibility on your list? https://www.packtpub.com/en-cy/newsletters/secproThe post is frequently cited in operator and VC circles for its market intelligence and strategic forecasting.This week's academiaFederated Learning-Driven Cybersecurity Framework for IoT Networks with Privacy-Preserving and Real-Time Threat Detectio... |
| [v6294] | Recourse provides individuals who received undesirable labels (e.g., denied a loan) from algorithmic decision-making systems with a minimum-cost improvement suggestion to achieve the desired outcome. https://arxiv.org/html/2509.21293v1In particular, we measure model changes by bounding the LpL^{p} norm of the difference between initial and changed models, where p ≥ 1p\geq 1 but p≠∞p\neq\infty. We provide a new algorithm that provably computes the optimal robust recourse for genera... |
| [v6300] | Detecting Concept Drift with SHapley Additive ExPlanations for Intelligent Model Retraining in Energy Generation Forecasting https://doi.org/10.1007/978-3-032-08324-1_7Detecting Concept Drift with SHapley Additive ExPlanations for Intelligent Model Retraining in Energy Generation Forecasting --- This study introduces a novel approach that leverages SHapley Additive Explanations (SHAP) to dynamically detect concept ... |
| [v6331] | Conduction and entropy analysis of a mixed memristor-resistor model for neuromorphic networks https://doi.org/10.1088/2634-4386/acd6b3Thus, network entropy is used to understand the self-reinforcing and cooperative inhibition of other memristive elements resulting in the formation of a winner-take-all path. Both the low interaction strength and the dilution of the memristive fracti... |
| [v6337] | With the increasing integration of a high proportion of renewable energy, the fluctuation characteristics of distributed power generation such as wind and photovoltaic energy affect the safe and stab https://www.frontiersin.org/journals/energy-research/articles/10.3389/fenrg.2025.1416309/fullA novel metric to quantify and enable resilient distribution system using graph theory and Choquet integral. Smart Grid9 (4), 2918 - 2929. 2016.2623818 SeivastavaA. K. (2016). Defining and enabling resiliency of electric distribution systems with mu... |
| [v6371] | Human-Centered LLM-Agent System for Detecting Anomalous Digital Asset Transactions https://arxiv.org/abs/2510.20102Large-Scale User Validation: Conduct IRB-approved studies to generalize trust and interpretability findings. Conclusion The accelerating complexity of digital asset ecosystems demands anomaly detection systems that are not only technically advanced... |
| [v6398] | Resource-Efficient Medical Image Classification for Edge Devices https://doi.org/10.1109/icamida64673.2025.11209605An emerging solution to this challenge is Saliency Guided Training, which integrates interpretability into the training process.By iteratively masking less relevant input features-those with low gradients-and enforcing consistent outputs for masked a... |
| [v6422] | This guide analyzes Atlas, CLOiD, Spirit v1.5 benchmarks, tools, and predictions. https://globzette.com/technology/embodied-ai-beyond-the-chatbot-2026/This guide analyzes Atlas, CLOiD, Spirit v1.5 benchmarks, tools, and predictions. Move from research pilots to factory/home deployment with proven strategies. ... Open-source tactile/multi-agent reasoning excels. Production-ready for warehouses/facto... |
| [v6460] | Conformal Feedback Alignment: Quantifying Answer-Level Reliability for Robust LLM Alignment https://arxiv.org/abs/2601.17329Ang Li, Qiugen Xiao, Peng Cao, Jian Tang, Yi Yuan, Zijie Zhao, Xiaoyuan Chen, Liang Zhang, Xiangyang Li, arXiv:2403.083092024arXiv preprintKaitong Yang, and 1 others Generating with confidence: Uncertainty quantification for black-box large language... |
| [v6569] | On the Hardness of Decentralized Multi-Agent Policy Evaluation under Byzantine Attacks https://doi.org/10.48550/arxiv.2409.128823) Main theoretical results: The following theorems state that, in the presence of Byzantine agents, no algorithm ensures that the normal agents' parameters converge to a fixed point in Problem 2. Theorem 1.When f > 0, Problem 2 is not solvable.Theo... |
| [v6706] | Explainability-Based Token Replacement on LLM-Generated Text https://doi.org/10.48550/arXiv.2506.04050Beyond SHAP and LIME, alternative explainability approaches have been explored for NLP tasks. SyntaxShap extends SHAP by incorporating syntactic structure, assigning importance scores to phrase-level constituents rather than individual tokens, which... |
| [v6719] | An Explainable AI Framework for Image Analytics and Synthetic Image Creation Using CNN and GAN Architectures https://doi.org/10.14445/23488387/ijcse-v13i2p101The framework also presented model-level, feature-level, and instance-level interpretability of CNN classifiers through gradient-based attribution, concept activation vectors, and saliency-based analysis of attention. Meanwhile, explainability is inh... |
| [v6743] | Ferret, a new Multimodal Large Language Model, excels in spatial referring and grounding within images using a hybrid region representation, achieving superior performance in multimodal tasks and red https://huggingface.co/papers/2310.07704Ferret, a new Multimodal Large Language Model, excels in spatial referring and grounding within images using a hybrid region representation, achieving superior performance in multimodal tasks and reducing object hallucination.... |
| [v6781] | Group Lasso Based Selection for High - Dimensional Mediation Analysis https://doi.org/10.1002/sim.70351For each model, sample N times its parameters according to their multivariate sampling distribution, and obtain the vectors or parameters Θ Y (n) and Θ Z (n) = Θ 1 (n) , . . . , Θ Kmax(n) , for n = 1, . . ., N .As in , the law of the parameters is ... |
| [v6784] | As LLM-based agents increasingly operate in multi-agent systems, understanding adversarial manipulation becomes critical for defensive design. https://verso.uidaho.edu/esploro/outputs/preprint/Intentional-Deception-as-Controllable-Capability-in/996896856401851As LLM-based agents increasingly operate in multi-agent systems, understanding adversarial manipulation becomes critical for defensive design. We present a systematic study of intentional deception as an engineered capability, using LLM-to-LLM intera... |
| [v6815] | Encrypted Spiking Neural Networks Based on Adaptive Differential Privacy Mechanism https://doi.org/10.3390/e27040333Based on the correlation between the model's output and the labels, as well as the differential privacy parameters, an adaptive noise scale is dynamically determined.... |
| [v6849] | Towards a Cognitive Meta-Model for Adaptive Trust and Reputation in Open Multi-Agent Systems https://doi.org/10.65109/xpvb5485In this paper, a cognitive meta-model for adaptive trust and reputation in open multi-agent systems is presented. It acts as a complement to a non-adaptive model by allowing the agent to reason about it and react to changes in the environment. We dem... |
| [v6901] | Generalized Multi-Relational Graph Convolution Network https://arxiv.org/abs/2006.07331Most GCN methods are either restricted to graphs with a homogeneous type of edges (e.g., citation links only), or focusing on representation learning for nodes only instead of jointly optimizing the embeddings of both nodes and edges for target-drive... |
| [v6912] | Measuring the Fragility of Trust: Devising Credibility Index via Explanation Stability (CIES) for Business Decision Support Systems https://arxiv.org/abs/2603.05024Research demonstrates that widely used post hoc methods such as LIME and SHAP can be manipulated: adversarial scaffolding can conceal underlying biases while generating seemingly benign explanations . Likewise, adversarial perturbations can produce i... |
| [v7024] | Detectability Thresholds for Network Attacks on Static Graphs and Temporal Networks: Information-Theoretic Limits and Nearly-Optimal Tests https://arxiv.org/abs/2509.10925We quantify how thresholds deform under bounded perturbations of the edge set (e.g., a small adversarial rewiring budget) and under mild model misspecification (e.g., modest heterogeneity in baseline edge probabilities or intensity drift).In our anal... |
| [v7032] | System and method for automated affinity-based network expansion through intelligent relationship discovery and compatibility matching https://patents.google.com/?oq=19298256The method of claim 10, wherein the method further comprises the steps of: calculating affinity-based user acquisition coefficients in real-time using cohort analysis to measure exponential growth effectiveness; implementing propagation pathway opt... |
| [v7040] | Multi-Domain Adversarial Variational Bayesian Inference for Domain Generalization https://doi.org/10.1109/tcsvt.2022.3232112Multi-Domain Adversarial Variational Bayesian Inference for Domain Generalization... |
| [v7081] | DSSA-TCN: Exploiting adaptive sparse attention and diffusion graph convolutions in temporal convolutional networks for traffic flow forecasting https://doi.org/10.1371/journal.pone.0336787As shown in Fig 1, the model first transforms the raw inputs into a latent representation through a linear projection, and augments it with time-of-day, day-of-week, and learnable node embeddings. These embeddings help the model capture periodic traf... |
| [v7092] | MotionLM: Multi-Agent Motion Forecasting as Language Modeling https://doi.org/10.48550/arxiv.2309.16534Of the existing joint prediction approaches, some apply a separation between marginal trajectory generation and interactive scoring .For example, Luo et al. initially produce a small set of marginal trajectories for each agent independently, before ... |
| [v7122] | Complex networks in Air Force-relevant applications, including multi-vehicle control, energy systems, and neuronal networks, are expected to guarantee performance, stability, and availability. https://hydra.ece.uw.edu/index.htmlAt present, there is no computationally tractable analytical framework for modeling and designing resilient networks with provable performance guarantees. We propose to research and develop a submodular optimization framework for resilient complex n... |
| [v7128] | Offline-to-Online Multi-Agent Reinforcement Learning with Offline Value Function Memory and Sequential Exploration https://doi.org/10.65109/whoy8671This improves online learning efficiency, as the offline pre-trained policy can focus on targeted exploration rather than an exhaustive random search of the action space, which is typically required when training from scratch. Offline MARL.The princ... |
| [v7130] | When Large Language Models Meet Personalization: Perspectives of Challenges and Opportunities https://doi.org/10.48550/arxiv.2307.16376In each dialogue turn, the system needs to decide whether to ask the user a question or provide a recommendation. The decision-making process, particularly regarding which attribute to ask about, is typically handled by a policy network. On the other... |
| [v7136] | FedJudge: Blockchain-based full-lifecycle trustworthy federated learning incentive mechanism https://doi.org/10.1109/trustcom60117.2023.00066This implementation guarantees a trustworthy incentive mechanism throughout the federated learning process. Through empirical validation and analysis on authentic datasets, we demonstrate that FedJudge significantly enhances Byzantine fault tolerance... |
| [v7214] | AI safetyBiosecurityCause prioritizationEffective givingExistential riskCareer choiceLong-Term Future FundEffective Altruism FundsLong-term futureThinking at the marginFunding opportunitiesGiving Sea https://forum.effectivealtruism.org/posts/qXWgFyQNgoijBzgwv/the-grant-decision-boundary-recent-cases-from-the-long-termThis part-time project aims to create transparent, programmatic replacements for sparse autoencoder neurons in language models by developing symbolic representations in Python, evaluating their predictive accuracy, and measuring their impact on model... |
| [v7273] | Position: Introspective Experience from Conversational Environments as a Path to Better Learning https://arxiv.org/abs/2602.14910When multi-agent systems are permitted to optimize their own communication protocols, they frequently converge on "Neuralese"-continuous vector-based exchanges that maximize information density and transmission speed.The LatentMAS framework recently ... |
| [v7283] | The internet has come a long way since its inception. https://smartechnews.com/featured/web-3-0-could-make-your-online-life-less-frustrating/Web 3.0's transparent and tamper-evident nature will ensure that online interactions are more accountable than ever. With blockchain's immutable ledger, users can trust that their transactions and interactions are recorded accurately and transparentl... |
| [v7325] | Spatial Preference Rewarding for MLLMs Spatial Understanding https://doi.org/10.48550/arXiv.2510.14374Compared to the baseline, SPR enhances MLLMs on both referring and grounding benchmarks, especially under higher IoU thresholds which demand higher localization accuracy. In addition, SPR can improve MLLM trustworthiness and reduce MLLM hallucination... |
| [v7329] | Adversarial robustness of amortized Bayesian inference https://doi.org/10.48550/arXiv.2305.14984Here, we study the adversarial robustness of amortized Bayesian inference, focusing on simulation-based estimation of multi-dimensional posterior distributions. (2023)... |
| [v7366] | Proving a Photo Is Real Is Now Harder Than Faking ... https://www.albis.news/perspectives/proving-photos-real-harder-than-faking-them-2026That's the idea behind C2PA - the Coalition for Content Provenance and Authenticity. It's an open standard backed by Adobe, Microsoft, Google, Intel, the BBC, and about 6,000 other organizations through the Content Authenticity Initiative. Instead of... |
| [v7389] | METR (where I work, though I'm cross-posting in a personal capacity) evaluated GPT-5 before it was externally deployed. https://www.lesswrong.com/posts/SuvWoLaGiNjPDcA7d/metr-s-evaluation-of-gpt-5However, it remains unclear to what extent these performance gains can be attributed to human-like task decomposition or simply the greater computation that additional tokens allow. We show that transformers can use meaningless filler tokens (e.g., '... |
| [v7408] | As an awardee, Vasisht will receive a $25,000 USD stipend and the opportunity to intern with IBM to improve his understanding of industrial research, broaden his range of technical contacts, and str https://uwaterloo.ca/computer-science/news/vasisht-duddu-awarded-2024-ibm-phd-fellowshipHis approach uses machine learning, cryptographic techniques, and trusted hardware to enable companies to validate their claims. This work resulted in a paper titled Attesting Distributional Properties of Training Data for Machine Learning, presented... |
| [v7413] | In Part 4, we opened up the anatomy of an autonomous agent - the Intelligence Core that reasons over goals and the Trust Layer that governs what actions are permissible. https://www.wipro.com/engineering/articles/scaling-trust-in-autonomous-operations-with-agentic-ops-and-agentic-os/Observability and Continuous Improvement: Agents generate structured reasoning logs, performance metrics, and decision traces. This observability layer allows engineers to audit agent conclusions, detect when model behaviour is drifting from expectat... |
| [v7414] | Learning Interaction-Aware Trajectory Predictions for Decentralized Multi-Robot Motion Planning in Dynamic Environments https://doi.org/10.1109/lra.2021.3061073E. Decentralized Multi-Robot Motion Planning Having the trained trajectory prediction model, we can incorporate it with the MPC framework and solve the problem (2) in a decentralized manner. As shown in Fig. 1, in a multi-robot navigation scenario, ... |
| [v7423] | Faster search by lackadaisical quantum walk https://doi.org/10.1007/s11128-018-1840-yWe perform a discrete-time coined quantum walk on this weighted graph while querying a Grover-type oracle that flips the sign of the amplitude at the marked vertex. (2018)... |
| [v7456] | Cyberlanguage: Native Communication for the Cyber-Physical-Social-Thinking Fusion Space https://arxiv.org/abs/2603.17498Empirical development requires CyberCorpus: a multimodal interaction corpus annotated with four-dimensional labels (P, S, T, C components and their cross-dimensional mappings).Candidate data sources include human-robot task logs, smart-home interacti... |
| [v7542] | Optimizing Graph Causal Classification Models: Estimating Causal Effects and Addressing Confounders https://arxiv.org/abs/2602.17941The intervention on a subset of nodes ⊆ modifies node features to produce an intervened graph ' with updated features ' : ' = (, ), where (.) denotes the controlled modification of node features for the intervened nodes.This enables to analyse how in... |
| [v7694] | A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey https://doi.org/10.1109/ACCESS.2022.3207472509 certificate that binds it to its authority name and is signed by a third party (trusted root). Nodes in this mode must support the same cipher suite as RPK mode. Moreover, in this mode, a node has also a list of trusted roots for certificate vali... |
| [v7702] | DNR: A Tunable Robust Pruning Framework Through Dynamic Network Rewiring of DNNs https://doi.org/10.1145/3394885.3431542These trends suggest that our robustness is not achieved via gradient obfuscation . Generalized Robustness Against PGD Attack of Different Strengths CONCLUSIONS This paper addresses the open problem of achieving ultra-high compression of DNN model... |
| [v7725] | Process And System For Securely Searching And Summarizing Data From Source Systems https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260127209).pnprovide the retrieved data and the correlated information to the operator. 2. The system of claim 1, wherein the one or more physical processors are further configured by the machine-readable instructions to dynamically generate harmonization steps ... |
| [v7814] | 6 proven lessons from the AI projects that broke before they scaled https://venturebeat.com/ai/6-proven-lessons-from-the-ai-projects-that-broke-before-they-scaledPrioritize explainability with tools like SHAP (SHapley Additive exPlanations) to build trust with stakeholders. Lesson 4: Ignoring deployment realities A model that shines in a Jupyter Notebook can crash in the real world. For example, a company's ... |
| [v7842] | Overcoming Data Loss in Wearable Disease Detection with GAN-Based Imputation https://doi.org/10.1038/s41746-026-02518-4High rates of missing data in wearable sensor streams hinder early detection of infectious diseases, especially in low-resource settings with inconsistent device adherence and connectivity. We developed a lightweight generative adversarial network (G... |
| [v7928] | Static Sandboxes Are Inadequate: Modeling Societal Complexity Requires Open-Ended Co-Evolution in LLM-Based Multi-Agent Simulations https://doi.org/10.48550/arXiv.2510.13982The development of genuinely open-ended, co-evolutionary simulations necessitates the concurrent evolution of agents and environments, fostering a continuous cycle of challenge and adaptation (Wang et al. 2023;Verma et al. 2023). Realization of this ... |
| [v7962] | Immutable Explainability: Fuzzy Logic and Blockchain for Verifiable Affective AI https://doi.org/10.48550/arXiv.2512.11065Second, audit logs often lack reliability, as the entity operating the system may alter them. In this work, we introduce the concept of Immutable Explainability, an architecture designed to address both challenges simultaneously. Our approach combine... |
| [v7987] | Simplified Action Decoder for Deep Multi-Agent Reinforcement Learning https://www.emergentmind.com/papers/1912.02288The SAD method incorporates best practices from recent advances in deep learning and reinforcement learning literature, such as recurrent neural networks to manage partial observability, distributed training frameworks improving sample efficiency, an... |
| [v8042] | Cooperative Observer-Based $\mathcal{H}_\infty$ Fault-Tolerant Tracking Control for Networked Processes with Sensor Faults https://arxiv.org/abs/2604.03921Simulations on star, cyclic, and path topologies with heterogeneous agents confirm reliable tracking despite abrupt sensor faults and bounded disturbances, demonstrating a scalable and resilient coordination strategy for multi-agent systems with sens... |
| [v8051] | DRP: Distilled Reasoning Pruning with Skill-aware Step Decomposition for Efficient Large Reasoning Models https://arxiv.org/abs/2505.13975Abstract: While Large Reasoning Models (LRMs) have demonstrated success in complex reasoning tasks through long chain-of-thought (CoT) reasoning, their inference often involves excessively verbose reasoning traces, resulting in substantial inefficien... |
| [v8072] | JAX-Privacy: A library for differentially private machine learning https://arxiv.org/abs/2602.17861The library provides verified, modular primitives for critical components for all aspects of the mechanism design including batch selection, gradient clipping, noise addition, accounting, and auditing, and brings together a large body of recent resea... |
| [v8129] | Never Compromise to Vulnerabilities: A Comprehensive Survey on AI Governance https://arxiv.org/abs/2508.08789For LLMs, alignment via RLHF provides foundational safety, but must be reinforced with runtime defenses such as input perplexity filters , circuit breakers , or ensemble-based rewriting frameworks like AutoDefense , MoGU .These defenses mitigate jail... |
| [v8175] | NeuroShield: A Neuro-Symbolic Framework for Adversarial Robustness https://arxiv.org/abs/2601.13162We introduce \DesignII, a neuro-symbolic framework that integrates symbolic rule supervision into neural networks to enhance both adversarial robustness and explainability. Domain knowledge is encoded as logical constraints over appearance attributes... |
| [v8260] | Co-ordinated Tracking and Planning Using Air and Ground Vehicles https://doi.org/10.1007/978-3-642-00196-3_16Similarly, the person is very small in the image, although relatively distinct; as a result, the motion of the helicopter makes the tracker lose track almost immediately without the ego-motion estimation. As a result, we use a motion model coupled w... |
| [v8265] | HalluScan: A Systematic Benchmark for Detecting and Mitigating Hallucinations in Instruction-Following LLMs https://arxiv.org/abs/2605.02443We present HalluScan, a comprehensive benchmark framework that systematically evaluates hallucination detection and mitigation across 72 configurations spanning 6 detection methods, 4 open-weight model families, and 3 diverse domains. We introduce th... |
| [v8296] | Uncovering the non-equilibrium stationary properties in sparse Boolean networks - NewsBreak https://www.newsbreak.com/news/2515379035731/uncovering-the-non-equilibrium-stationary-properties-in-sparse-boolean-networksThis is a form of test-time training that creates a self-supervised learning problem on test samples before performing the prediction task. In this way, our method enables efficient adaptation of encoded representations to evolving distributions, lea... |
| [v8322] | Automatic Document Editing for Improved RankingNiv Bardas, Tommy Mordo, Oren Kurland, Moshe Tennenholtz. https://researchr.org/alias/moshe-tennenholtz... icdcs 2021: 954-964 Multi-issue social learningGal Bahar, Itai Arieli, Rann Smorodinsky, Moshe Tennenholtz. mss, 104:29-39, 2020. [ Fiduciary BanditsGal Bahar, Omer Ben-Porat, Kevin Leyton-Brown, Moshe Tennenholtz. icml 2020: 518-527 VCG under S... |
| [v8414] | Home Artificial Intelligence The Multi-Agent Trap | https://singularityfeed.com/the-multi-agent-trap-towards-data-science/Unstructured multi-agent networks amplify errors as much as 17.2 instances in comparison with single-agent baselines. Not 17% worse. Seventeen instances worse. When brokers are thrown collectively with out structured topology (what the paper calls ... |
| [v8446] | Bayesian Dynamic Causal Discovery https://www.semanticscholar.org/paper/ec16fdb759d4a169d01905822be1e7d8ca885e85Bayesian causal discovery methods tackle this problem by learning a posterior over the set of admissible graphs that are equally likely given our priors and observations. (2022)... |
| [v8447] | Posted on September 7, 2020 January 21, 2021 by Mike Gianfagna https://semiwiki.com/ip/dolphin-design/290385-dolphin-design-delivering-high-performance-audio-processing-with-tsmcs-22ull-process/The figure below illustrates the high-performance and ultra-low power audio processing they can deliver for voice detection. The Dolphin approach for voice detection provides the following benefits: Stand-alone IP embedding a smart algorithm to det... |
| [v8492] | TRUST Agents: A Collaborative Multi-Agent Framework for Fake News Detection, Explainable Verification, and Logic-Aware Claim Reasoning https://arxiv.org/abs/2604.12184Although supervised encoders remain stronger on raw metrics, TRUST Agents improves interpretability, evidence transparency, and reasoning over compound claims. Results also show that retrieval quality and uncertainty calibration remain the main bottl... |
| [v8528] | Stable Language Guidance for Vision-Language-Action Models https://arxiv.org/abs/2601.04052Abstract: Vision-Language-Action (VLA) models have demonstrated impressive capabilities in generalized robotic control; however, they remain notoriously brittle to linguistic perturbations. We identify a critical ``modality collapse'' phenomenon wher... |
| [v8549] | WebGen-R1: Incentivizing Large Language Models to Generate Functional and Aesthetic Websites with Reinforcement Learning https://arxiv.org/abs/2604.20398As shown in Figure 6, WebGen-R1 consistently outperforms a range of state-of-the-art proprietary and open-source baselines, such as DeepSeek-R1, GPT-5, and Qwen3-32B, on AAS. This suggests that WebGen-R1 has learned architecture-level and style-level... |
| [v8713] | Differential Privacy Integrated Federated Learning for Power Systems: An Explainability-Driven Approach https://doi.org/10.32604/cmc.2025.065978Differential Privacy Integrated Federated Learning for Power Systems: An Explainability-Driven Approach... |
| [v8734] | Reinforcement Learning (RL) has emerged as a pivotal and transformative subset of machine learning, enabling autonomous agents to acquire optimal behaviors and decision-making policies through iterat https://medtechnews.uk/research-reports/reinforcement-learning-a-comprehensive-exploration-of-its-fundamentals-algorithms-historical-development-and-applications-across-industries/However, the widespread and responsible deployment of RL systems hinges on diligently addressing several critical challenges. The inherent demand for vast amounts of interaction data necessitates ongoing research into sample-efficient learning, inclu... |
| [v8752] | A Unified Framework for Evaluating and Enhancing the Transparency of Explainable AI Methods via Perturbation-Gradient Consensus Attribution https://arxiv.org/abs/2412.03884We propose Perturbation-Gradient Consensus Attribution (PGCA), a novel XAI method that fuses dense perturbation-based importance with Grad-CAM++ spatial precision through a five-stage pipeline comprising dual-strategy perturbation, gradient-based ref... |
| [v8781] | A comfortable graph structure for Grover walk https://doi.org/10.1088/1751-8121/acd735The time evolution is determined by the Grover matrices assigned at each vertex: for each vertex u and each time step, the transmitting weight is 2/ deg(u) while the reflection weight is 2/ deg(u) - 1. Then on the tails, the dynamics is free because ... |
| [v8791] | ElliCE: Efficient and Provably Robust Algorithmic Recourse via the Rashomon Sets https://arxiv.org/abs/2602.07674Robustness = 1 n n i=1 1 ∀f θ ∈ R(ε target ), f θ (x ci ) = c . A higher robustness score (closer to 1) is better, indicating that more counterfactual explanations are robust to model changes. Experimental Setup.For evaluators, we define a target m... |
| [v8861] | Distributed Network Application Security Policy Generation and Enforcement for Microsegmentation https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260067336).pnThe method of claim 1, wherein the microsegmentation policy includes constraints applied during machine learning classification to optimize at least one of performance, accuracy, or human interpretability. 8. The method of claim 1, wherein the host ... |
| [v8965] | SYBR Green qPCR Master Mix manufacturer Echniques. https://www.siksinhibitor.com/2022/05/31/8570/The authors in use state-of-the-art meta-learning schemes,namely MAML, FOMAML, REPTILE, and CAVIA, for IoT scenarios working with offline and on the internet meta finding out strategy. The outcomes show the benefit of meta-learning in both offline a... |
| [v8985] | The AI-native agency model is emerging across three major verticals of professional services. http://ai-native-agency.com/blog/ai-native-agency-verticalsSub-linear infrastructure scaling: Infrastructure costs (servers, API subscriptions, tooling) scale sub-linearly with revenue. Doubling the client base does not double infrastructure costs - it might increase them by 30-50%. The compounding effect o... |
| [v9083] | We describe an exact algorithm to solve linear systems of the form Hx = b where H is the Hessian of a deep net. https://doi.org/10.48550/arxiv.2601.06096Unfortunately, there seems to exist no variant of Pearlmutter's trick to compute the Hessian-inverse-vector products directly. The proposed Hessian-inverse-vector product algorithm takes advantage of a deep net's layerwise structure.... |
| [v9141] | NutVLM: A Self-Adaptive Defense Framework against Full-Dimension Attacks for Vision Language Models in Autonomous Driving https://arxiv.org/abs/2602.13293Furthermore, CADA utilizes risky scene induction to dismantle the causal reasoning required for navigation, encompassing both local and global adversarial threats. These evolving attacks underscore the urgent need for more effective defense methods.... |
| [v9145] | Opaque machine-learning models are systems whose internal decision logic is not directly interpretable by human stakeholders. https://www.ask.com/lifestyle/blackbox-ai-architectures-explainability-governance-considerationsRobustness testing probes responses to distributional shift and adversarial perturbations. Fairness metrics check disparate impacts across groups. Explainability evaluation assesses fidelity (how well an explanation matches model behavior) and useful... |
| [v9146] | Versatile Behavior Diffusion for Generalized Traffic Agent Simulation https://doi.org/10.1109/tits.2026.3662886Notably, our VBD model achieves this with fewer parameters than autoregressive generation models, achieving a balance between performance and computational efficiency. We present a selection of qualitative simulation results in Fig. 3, showcasing the... |
| [v9152] | Entropy-Regularized Token-Level Policy Optimization for Language Agent Reinforcement https://arxiv.org/abs/2402.06700Besides, a reward signal is obtained after executing a complete action, which is too sparse to provide fine-grained supervision for each token.Applying it to all tokens within an action as Equation 5 might lead to a misalignment between token generat... |
| [v9156] | Publications by 'Chan Yeob Yeun' https://researchr.org/alias/chan-yeob-yeunData Poisoning Against Federated Learning: Comparative Analysis Under Label-Flipping Attacks and GAN-Generated EEG DataMaryam Alsereidi, Abeer Awadallah, Alreem Alkaabi, Sangyoung Yoon, Chan Yeob Yeun. Investigating How Data Poising Attacks Can Impac... |
| [v9175] | In recommender systems, usually the ratings of a user to most items are missing and a critical problem is that the missing ratings are often missing not at random (MNAR) in reality. https://icml.cc/virtual/2019/session/4915The ability to perform offline A/B-testing and off-policy learning using logged contextual bandit feedback is highly desirable in a broad range of applications, including recommender systems, search engines, ad placement, and personalized health care... |
| [v9237] | TAMAS: Benchmarking Adversarial Risks in Multi-Agent LLM Systems https://doi.org/10.48550/arXiv.2511.05269An agent can invoke these tools to perform the user task. O = (o 1 , o 2 , . . . , o m ) denotes the observations based on the actions taken by the agents. For a given query q we aim to maximize: where a b is the benign action and 1 is an indicator f... |
| [v9344] | TeraSignal Introduces TSLink: Protocol-Agnostic Intelligent Interconnect for Plug-and-Play Linear Optics in AI Infrastructure https://www.prnewswire.com/news-releases/terasignal-introduces-tslink-protocol-agnostic-intelligent-interconnect-for-plug-and-play-linear-optics-in-ai-infrastructure-302250369.htmlLower Bit Error Rate: TSLink eliminates the quantization noise introduced by analog-to-digital converters (ADCs) in DSP-based re-timers, significantly improving the BER in the link. Reduced Latency: TSLink removes the high latency caused by DSP proc... |
| [v9394] | Minimizing Hallucinations and Communication Costs: Adversarial Debate and Voting Mechanisms in LLM-Based Multi-Agents https://www.mdpi.com/2076-3417/15/7/3676This paper aims to address the hallucination issue of LLMs by introducing adversarial and voting mechanisms in multi-agent LLMs.... |
| [v9402] | Blockchain Trends To Look Forward To in 2026 https://intellivon.com/blogs/blockchain-trends/With continuous developments down the line, blockchain will act as the governance backbone for AI, logging every model version, dataset lineage, parameter change, and deployment approval on an immutable ledger. Smart contracts will enforce multi-part... |
| [v9482] | Most n8n AI agents fail in production. https://chronexa.io/blog/n8n-ai-agent-node-enterprise-architecture-guide-(2026)Crucially, production systems require confidence scoring and human-in-the-loop (HITL) thresholds. We implement logic that forces the agent to self-evaluate its output. If the extraction confidence falls below a pre-defined threshold - say 94% - the s... |
| [v9512] | OOWM: Structuring Embodied Reasoning and Planning via Object-Oriented Programmatic World Modeling https://arxiv.org/abs/2604.09580First, it generates the State Abstraction ( state ), mapping visual features to a structured object hierarchy.Subsequently, it derives the Control Policy ( control ), which instantiates the Transition Logic (T ), governing the executable cleaning wor... |
| [v9514] | Chapter 10: Data Drift in LLMs - Causes, Challenges, and Strategies https://nexla.com/ai-infrastructure/data-drift/Organizations must strategically plan their data collection efforts, seeking diverse sources and timely representation to bolster re-training initiatives. Data augmentation process (Source) #5 Dynamic adaptation Dynamic adaptation is continuous re... |
| [v9529] | In today's digital age, 5G technology has become the backbone of connectivity, supporting everything from mobile communications to smart cities and autonomous vehicles. https://moderndiplomacy.eu/2024/10/27/securing-5g-networks-how-ai-is-changing-the-game/Integration with Security Information and Event Management (SIEM) tools allows for real-time threat detection and response, enhancing the network's resilience.... |
| [v9541] | Comparative Analysis of Statistical, Time - Frequency, and SVM Techniques for Change Detection in Nonlinear Biomedical Signals https://www.mdpi.com/2624-6120/5/4/41By leveraging large-scale datasets and hierarchical representations, deep learning models can automatically learn discriminative features and detect subtle changes in signals with high accuracy. Moreover, techniques such as transfer learning and adve... |
| [v9614] | XiaoYee / Awesome_Efficient_LRM_Reasoning Public https://github.com/XiaoYee/Awesome_Efficient_LRM_ReasoningMeta-Reasoner: Dynamic Guidance for Optimized Inference-time Reasoning in Large Language Models Test-Time Preference Optimization: On-the-Fly Alignment via Iterative Textual Feedback TreeBoN: Enhancing Inference-Time Alignment with Speculative Tree... |
| [v9618] | Why do RAG systems fail at scale? https://www.kapa.ai/blog/rag-gone-wrong-the-7-most-common-mistakes-and-how-to-avoid-themWhat causes embedding rot and how do I fix it? Embedding rot occurs when the vector store remains static but the underlying data changes. Essentially, your responses will be based on stale data. Consider re-indexing your store when: 10-15% of your ... |
| [v9672] | MAPPO-LCR: Multi-Agent Proximal Policy Optimization with Local Cooperation Reward in spatial public goods games https://doi.org/10.1016/j.chaos.2026.117948MAPPO is a Centralized-Training and Decentralized-Execution (CTDE) framework that extends the original PPO algorithm to cooperative multiagent systems. Let π θ (a i t | s i t ) denote the decentralized policy of agent i with parameters θ. Each agent ... |
| [v9689] | Explainable AI (XAI) refers to techniques and methods that make the behavior and outputs of artificial intelligence systems understandable to humans. https://www.respan.ai/glossary/explainable-aiThe EU AI Act requires transparency for high-risk AI systems. GDPR's Article 22 gives individuals the right to meaningful information about automated decision-making logic. US regulations like ECOA and FCRA require explanations for adverse credit dec... |
| [v9717] | Home > Open Access Journals > MCA > Vol. 8 > Iss. https://digitalcommons.usf.edu/mca/vol8/iss1/8/Blockchain technology in its most basic form is a distributed, immutable ledger that can be used to store data and is controlled by various nodes. By recording system activities and operational data on a distributed, tamper-evident blockchain, we dev... |
| [v9720] | Causal modeling of school aversion in psychiatrically referred adolescents: a DoWhy-based analysis https://pubmed.ncbi.nlm.nih.gov/41952142/Causal inference was conducted through a combined framework of DAG learning, DoWhy estimation with backdoor propensity-score weighting and logistic-model-based counterfactual simulation. All analyses were performed using Python 3.11.8, with pgmpy, Do... |
| [v9728] | Think Locally, Explain Globally: Graph-Guided LLM Investigations via Local Reasoning and Belief Propagation https://arxiv.org/abs/2601.17915LLM agents excel when environments are mostly static and the needed information fits in a model's context window, but they often fail in open-ended investigations where explanations must be constructed by iteratively mining evidence from massive, het... |
| [v9804] | Mira Network, a provider of decentralized AI infrastructure for trustless verified intelligence, has launched its testnet alongside a next generation suite of API's marking a major milestone in secur https://www.dlnews.com/research/internal/mira-network-launches-highly-anticipated-next-gen-suite-of-apis-and-testnet-for-verified-ai-intelligence/Large language models (LLMs) and generative AI tools have revolutionized how people interact with technology, but they often grapple with challenges such as AI hallucinations and bias. Mira tackles these issues head-on with a novel distributed consen... |
| [v9929] | Toward Faithful Explanations in Acoustic Anomaly Detection https://doi.org/10.48550/arXiv.2601.12660In this work, we study the interpretability of autoencoder-based models for audio anomaly detection, by comparing a standard autoencoder (AE) with a mask autoencoder (MAE) in terms of detection performance and interpretability. We applied several att... |
| [v9991] | Designing Human-Centered AI to Prevent Medication Dispensing Errors: Focus Group Study With Pharmacists https://pubmed.ncbi.nlm.nih.gov/38145475/This study highlights the process of designing a human-centered AI for dispensing verification, emphasizing its interpretability, confidence visualization, and collaborative human-machine teaming styles. (2023)... |
| [v10050] | Safety Instincts: LLMs Learn to Trust Their Internal Compass for Self-Defense https://doi.org/10.48550/arXiv.2510.01088We introduce Safety Instincts Reinforcement Learning (SIRL), which transforms this internal confidence into a self-generated reward signal, eliminating dependence on external validators or human annotations. SIRL teaches models to trust their safety ... |
| [v10165] | Soft actor-critic algorithm and improved GNN model in secure access control of disaggregated optical networks https://doi.org/10.1038/s41598-025-15225-zThe study primarily tests the decision efficiency and communication overhead of GESAC under different network topology scales, assessing its scalability limit.The results are shown in Fig. 10: As shown in Fig. 10, the distributed architecture of GESA... |
| [v10170] | Interpretability refers to the degree to which human experts can understand and explain a system's decisions or outputs. https://www.xcubelabs.com/blog/explainability-and-interpretability-in-generative-ai-systems/Feature attribution: Identifying which parts of the input image contributed to the generated output. Counterfactual explanations: Understanding how changes in the input image would affect the generated output. Model interpretability: Analyzing the ... |
| [v10273] | Modeling what Matters: Emergent Abstraction In Reinforcement Learning - Robotics Institute Carnegie Mellon University https://www.ri.cmu.edu/event/modeling-what-matters-emergent-abstraction-in-reinforcement-learning/On the model-free, multi-agent side, we introduce Partial Reward Decoupling (PRD), a game-abstraction mechanism that dynamically decomposes teams into subgroups, simplifying cross-agent credit assignment and accelerating cooperative learning. We also... |
| [v10345] | Taming the Curses of Multiagency in Robust Markov Games with Large State Space through Linear Function Approximation https://arxiv.org/abs/2605.03125Abstract: Multi-agent reinforcement learning (MARL) holds great potential but faces robustness challenges due to environmental uncertainty. To address this, distributionally robust Markov games (RMGs) optimize worst-case performance when the environm... |
| [v10351] | DPWriter: Reinforcement Learning with Diverse Planning Branching for Creative Writing https://huggingface.co/papersBy leveraging diversity-seeking reinforcement learning algorithms, we introduce a novel sparse reward function for token-level learning signals that encourage diverse, high-likelihood latent CoT, overcoming deterministic sampling limitations and avoi... |
| [v10468] | typed-recall added to PyPI https://pypi.org/project/typed-recall/Memory layer for AI agents - typed-edge graph, bounded hallucination, audit-grade, surgically forgettable. ... A B C, all supports edges True A B C with C A contradicts (frustrated triangle) False Pure-contradicts cycle False (frustration=1.00) ... |
| [v10524] | Introduce Chain-of-Model (CoM) paradigm to enhance scaling efficiency and inference flexibility. https://ainativefoundation.org/ai-native-daily-paper-digest-20250520/Introduce AdaCoT (Adaptive Chain-of-Thought) to address inefficiencies in reasoning tasks for Large Language Models by adaptively determining when to invoke Chain-of-Thought. Utilize reinforcement learning with Proximal Policy Optimization to adjust... |
| [v10597] | How AI QA Teams Are Debugging the Future of Software Quality https://vmblog.com:443/archive/2025/07/16/how-ai-qa-teams-are-debugging-the-future-of-software-quality.aspxSoftware teams work with tight deadlines and complex systems. Manual testing can't always keep up - it happens late, misses edge cases, and doesn't scale well. ... ... severity and root cause Store data in centralized repositories accessible by you... |
| [v10619] | Highlights of all 1,899 NeurIPS-2020 papers. https://resources.paperdigest.org/2020/11/neurips-2020-highlights/99 Model-Based Multi-Agent RL In Zero-Sum Markov Games With Near-Optimal Sample Complexity Highlight: In this paper, we aim to address the fundamental open question about the sample complexity of model-based MARL. Related Papers Related Patents Rel... |
| [v10752] | Toward Safe and Human-Aligned Game Conversational Recommendation via Multi-Agent Decomposition https://doi.org/10.48550/arxiv.2504.20094Finally, to mitigate safety and transparency risks (Challenge 3), MATCHA introduces a Risk Control Agent that detects adversarial prompts and filters harmful outputs, alongside an Explanation Agent that generates detailed, user-facing rationales to e... |
| [v10841] | Quantum Circuit Design for Training Perceptron Models https://arxiv.org/abs/1802.05428In the appendix, we show that the success probability has a similar scaling with that of Gaussian distribution when the weight vector is unifromly sampled from the unit sphere of the version space, and it can be higher when the dimension of the versi... |
| [v10859] | Towards desiderata-driven design of visual counterfactual explainers https://doi.org/10.1016/j.patcog.2025.112811Our in-the-loop gain evaluation can also be viewed as a simulation of a human study, with the difference that the user is modeled as an oracle and the study is fully reproducible.Furthermore, measuring performance gain rather than relying on subjecti... |
| [v10873] | CASC's Machine Intelligence Group was founded in 2020 to create a home base for technical staff and postdocs conducting fundamental and applied research in machine learning (ML) in support of the La https://computing.llnl.gov/casc/machine-intelligence-groupSam Sakla: deep learning, computer vision, self-supervised learning, fine-grained classification, object detection, manifold learning, multi-resolution image/signal processing Gautam Singh: generative models, large language models, agent learning, m... |
| [v10903] | Think Deep and Fast: Learning Neural Nonlinear Opinion Dynamics from Inverse Dynamic Games for Split-Second Interactions https://doi.org/10.1109/icra55743.2025.11127283Outracing champion Gran Turismo drivers with deep reinforcement learning. P R Wurman, S Barrett, Nature. 6022022 Learn Thy Enemy: Online, Task-Aware Opponent Modeling in Autonomous Racing. L Chen, S Manuel, J Delgado, J Subotsis, P Tylkin, Symposium... |
| [v11003] | Language-Guided Multi-Agent Learning in Simulations: A Unified Framework and Evaluation https://doi.org/10.48550/arxiv.2506.04251LLM-Communicator: Serves as a decentralized communication interface, enabling agents to encode, decode, and interpret emergent natural language messages for coordination.Agents exchange symbolic messages such as "cover me" or "focus fire" generated f... |
| [v11067] | PQS-BFL: A post-quantum secure blockchain-based federated learning framework https://doi.org/10.1016/j.eswa.2026.131449This growth is sub-linear, suggesting that the system can handle an increasing number of clients without prohibitive increases in round duration, at least within the tested range.The average per-client transaction time remained relatively stable or e... |
| [v11082] | Cross-Modal Attention Analysis and Optimization in Vision-Language Models: A Study on Visual Reliability https://arxiv.org/abs/2604.17217Future research directions include validating optimization strategies on natural image datasets, evaluating larger-scale VLMs, exploring explicit cross-modal alignment constraints such as contrastive loss regularization and attention guidance, develo... |
| [v11121] | Are You the A-hole? A Fair, Multi-Perspective Ethical Reasoning Framework https://arxiv.org/abs/2605.00270We propose a neuro-symbolic aggregation framework that formalizes conflict resolution through Weighted Maximum Satisfiability (MaxSAT). Our pipeline utilizes a language model to map unstructured natural language explanations into interpretable logica... |
| [v11134] | Recent work in machine learning has yielded in algorithms with high performance and accuracy. https://projekter.aau.dk/performance-evaluation-of-explainable-ai-algorithms-against-adversarial-noise-03096450.htmlTo overcome this issue, explainable AI (XAI) algorithms have been developed to add an extra layer of explainability towards AI. But with adversarial attacks at hand, even these algorithms become vulnerable. The aim of this paper is to study the effec... |
| [v11265] | Aligning Agent Policy with Externalities: Reward Design via Bilevel RL https://cdnjs.deepai.org/profile/mengdi-wangParameter-Efficient Sparsity for Large Language Models Fine-Tuning With the dramatically increased number of parameters in language models,... 0 Yuchao Li, et al. ' Near-optimal Offline Reinforcement Learning with Linear Representation: Leveraging... |
| [v11311] | COHORT: Hybrid RL for Collaborative Large DNN Inference on Multi-Robot Systems Under Real-Time Constraints https://arxiv.org/abs/2603.10436To move beyond single decision makers and enable collaborative execution across multiple edge devices, several works formulate task execution as a multi-agent control problem.In , edge servers are modeled as partially observable agents in a Dec-POMDP... |
| [v11321] | Learning Long-Context Diffusion Policies via Past-Token Prediction https://arxiv.org/abs/2505.09561Recent research in language modeling, image generation, and robotics has shown that inference-time compute may allow models to improve their performance .Some seek to build an additional verifier to re-rank the output samples [9,17,41,42], while othe... |
| [v11337] | This paper introduces a novel XAI-based methodology to detect adversarial attacks on deepfake detectors. https://deepfake-demo.aisec.fraunhofer.de/related_work/2403.02955The XAI-based approach effectively detects adversarial attacks on visual deepfake detectors, with Saliency and Guided Backpropagation generally yielding the highest accuracy, especially when the full model is finetuned. The method shows promising gen... |
| [v11347] | SpatiO: Adaptive Test-Time Orchestration of Vision-Language Agents for Spatial Reasoning https://arxiv.org/abs/2604.21190SpatiO assembles a diverse pool of VLMs with distinct architectures, training objectives, and geometric inductive biases, each independently solving the spatial query under a designated reasoning role.We propose a novel Test-Time Orchestration (TTO) ... |
| [v11421] | In an era where identity is the new perimeter, we deploy cognitive security architectures that leverage real-time behavioral telemetry and autonomous policy enforcement to secure the enterprise at sc https://sabalynx.com/ai-identity-access-management/The "Hard Truth" is managing the 8% margin of error. ""AI Hallucination" in IAM manifests as anomalous bypasses where the model misinterprets a legitimate but rare user behavior as a threat - or a sophisticated adversary's "low and slow" attack as be... |
| [v11683] | AI-Assisted Code Migration: 2026 Guide to Agentic Modernization https://article-realm.com/article/Computers/Software/82236-AI-Assisted-Code-Migration-2026-Guide-to-Agentic-Modernization.htmlThe smartest enterprises we've seen build human-in-the-loop (HITL) checkpoints at every critical decision point - especially for business logic transformations, security-sensitive code, and regulatory compliance sections. Our investigation demonstra... |
| [v11707] | Artificial Intelligence Selection And Configuration https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260127494).pnArtificial Intelligence Selection And Configuration --- The method of claim 5, wherein the AI component type optimized for data storage or retrieval comprises a blockchain-based distributed ledger, wherein automatically configuring the intelligent ag... |
| [v11756] | Online Topology Inference from Streaming Stationary Graph Signals with Partial Connectivity Information https://doi.org/10.3390/a13090228Indeed, we examine how the variability and eigenvectors of the underlying graph as well as the diffusion filters' frequency response influence the size of the convergence radius (or misadjustment in the adaptive filtering parlance). (2020)... |
| [v11766] | Submitted on 27 May 2019 (v1), last revised 4 Oct 2019 (this version, v2)] https://arxiv.org/abs/1905.11468v2First, we derive new per-image theoretical robustness bounds based on local gradient information. These bounds strongly motivate input gradient regularization. Second, we implement a scaleable version of input gradient regularization which avoids dou... |
| [v11794] | Towards Assessing and Benchmarking Risk-Return Tradeoff of Off-Policy Evaluation Haruka https://speakerdeck.com/harukakiyohara_/towards-risk-return-assessment-of-opeMay 2024 Towards assessing risk-return tradeoff of OPE 12 (estimated) marginal importance weight state-action visitation probability Summary of OPE Off-Policy Evaluation (OPE) aims to evaluate the expected performance of a policy using only offline... |
| [v11819] | PointMAC: Meta-Learned Adaptation for Robust Test-Time Point Cloud Completion https://doi.org/10.48550/arxiv.2510.10365A meta-auxiliary learning strategy based on Model-Agnostic Meta-Learning (MAML) ensures that adaptation driven by auxiliary objectives is consistently aligned with the primary completion task.During inference, we adapt the shared encoder on-the-fly b... |
| [v11850] | Persistent cognitive machine with curated long term memory https://patents.google.com/?oq=19321173These adapters handle variations in formatting, vocabulary, and reasoning granularity, ensuring smooth thought transfer between models with different characteristics. The cache incorporates a contextual validation layer that assesses thought applica... |
| [v11937] | In this article: View the comprehensive list of regulations available to build assessments in Compliance Manager. https://learn.microsoft.com/en-us/purview/compliance-manager-regulations-listISO/IEC 23894:2023 ISO/IEC 42001:2023 NIST AI Risk Management Framework (RMF) 1.0 Guidelines and Functional Requirements for Electronic Records Management Systems (ICA Module 2) ISO 15489-1:2016 ISO 16175-1:2020 ISO 19791 - Information technolo... |
| [v11938] | Temporal Action Proposal Generation with Background Constraint - NewsBreak https://www.newsbreak.com/news/2462358269144/temporal-action-proposal-generation-with-background-constraint... for Self-Supervised Visual Pre-Training - https://newsbreak.com/news/2463395356139/masked-feature-prediction-for-self-supervised-visual-pre-training URL: Constraints on subleading interactions in beta decay Lagrangian - https://newsbreak.com/new... |
| [v11946] | Generation-Augmented Latent Navigation for Continuous Spatiotemporal Zoom and Rotation in Immersive Environments https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260017457).pnGeneration-Augmented Latent Navigation for Continuous Spatiotemporal Zoom and Rotation in Immersive Environments --- The system further incorporates a symbolic anchor manager that establishes persistent semantic landmarks within the latent space, ena... |
| [v11995] | We've observed that in applied RL settings, the question of whether it makes sense to use multi-agent algorithms often comes up. https://rise.cs.berkeley.edu/blog/scaling-multi-agent-rl-with-rllib/Similarly, policy-gradient algorithms like A3C and PPO may struggle in multi-agent settings, as the credit assignment problem becomes increasingly harder with more agents. Consider a traffic gridlock between many autonomous agents. It is easy to see ... |
| [v12013] | Multi-Agent Systems and Optimization: Enhancing Efficiency Through Collaborative AI https://smythos.com/developers/agent-development/multi-agent-systems-and-optimization/By leveraging advanced algorithms and distributed decision-making, MAS have demonstrated their ability to outperform traditional approaches in areas such as traffic management and energy distribution. The power of MAS lies in their ability to break ... |
| [v12056] | The effect of data poisoning on counterfactual explanations https://doi.org/10.1016/j.inffus.2026.104237This work studies the vulnerability of counterfactual explanations to data poisoning.We formalize data poisoning in the context of counterfactual explanations for increasing the cost of recourse on three different levels: locally for a single instanc... |
| [v12070] | D-REX: A Benchmark for Detecting Deceptive Reasoning in Large Language Models https://doi.org/10.48550/arXiv.2509.17938We define this as a scenario where a model produces a benign or helpful response, while its internal reasoning process, or chain-of-thought (CoT), follows a hidden, malicious directive. This behavior can be induced by sophisticated system prompt inje... |
| [v12098] | Neural Rendering For Inverse Graphics Generation https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260127820).pnIn at least one embodiment, and without limitation, machine learning models used by system may include machine learning model(s) using linear regression, logistic regression, decision trees, support vector machines (SVM), Naive Bayes, k-nearest neigh... |
| [v12118] | Getting value from your data shouldn’t be this hard https://www.technologyreview.com/2021/10/19/1037290/getting-value-from-your-data-shouldnt-be-this-hard/As data's applications grow and become more ubiquitous, producers, consumers, and owners and stewards of data are finding that they don't have a playbook to follow. Consumers want to connect to data they trust so they can make the best possible decis... |
| [v12122] | AegisMCP: Online Graph Intrusion Detection for Tool-Augmented LLMs on Edge Devices https://doi.org/10.48550/arXiv.2510.19462Robust training (edge-dropout, adversarial negatives), conservative novelty weighting, and guardrail escalators for high-risk motifs (e.g., install then egress to a new domain) reduce susceptibility. Topology-aware regularization and adversarial subg... |
| [v12125] | Federated Learning (FL) is a distributed learning paradigm that leverages the computational strength of local devices to collaboratively train a model. https://scholarsmine.mst.edu/comsci_facwork/2048/The clients train the local model on their respective devices and submit the weight updates to the server for aggregation. This paradigm allows the clients to experience diverse data without sharing their local data with other participants or the ser... |
| [v12128] | Interplay between Security, Privacy and Trust in 6G-enabled Intelligent Transportation Systems AHMED DANLADI ABDULLAHI * (Student Member, IEEE), ERFAN BAHRAMI † , TOOSKA DARGAHI * (Member, IEEE), https://doi.org/10.48550/arxiv.2510.02487Dynamic trust computation in multi-agent systems Computing and adapting trust scores for vehicles in dynamic, adversarial, and high-mobility settings remains underexplored, particularly for large-scale, real-world ITS deployments. significant privac... |
| [v12130] | Machine Learning (ML) continues to evolve rapidly, driven by advances in hardware, model architectures, and data-centric methodologies. https://dev.to/ashishsinghbora/a-technical-deep-dive-into-machine-learning-architectures-paradigms-and-optimization-strategies-cpdAutomated retraining via CI/CD pipelines, feature stores (e.g., Feast), and model registries (e.g., MLflow, SageMaker). Hybrid deployment models combining serverless inference, on-prem acceleration, and edge serving. Neuro-Symbolic and Hybrid AI C... |
| [v12143] | e-Postgraduate Diploma (ePGD) in Computer Science And Engineering https://www.mygreatlearning.com/iit-bombay-e-postgraduate-diploma-computer-science-engineeringThe course then develops expertise in value-based methods, including their extension using function approximation and deep learning for complex, high-dimensional environments. It further covers different classes of RL methods such as policy-gradient ... |
| [v12162] | ARES: Adaptive Red-Teaming and End-to-End Repair of Policy-Reward System https://arxiv.org/abs/2604.18789... blind spots and biases. The second stage then utilizes this improved RM to optimize the Core LLM, creating a more robustly aligned system overall. Extensive experiments across diverse safety evaluations demonstrate that ARES substantially improve... |
| [v12165] | CiteAudit: You Cited It, But Did You Read It? A Benchmark for Verifying Scientific References in the LLM Era https://arxiv.org/abs/2602.23452We design a multi-agent verification pipeline that decomposes citation checking into metadata extraction, memory lookup, web-based retrieval, and final judgment. To evaluate this, we construct a large-scale, human-validated dataset spanning diverse d... |
| [v12184] | fairadapt: Causal Reasoning for Fair Data Pre-processing https://arxiv.org/abs/2110.10200The following sections describe an implementation of the fair data adaptation method outlined in Plecko and Meinshausen (2020), which combines the notions of counterfactual fairness and resolving variables, and explicitly computes counterfactual valu... |
| [v12212] | FLARE: Adaptive Multi-Dimensional Reputation for Robust Client Reliability in Federated Learning https://arxiv.org/abs/2511.14715The reliability threshold Θ t at round t evolves based on model convergence and detected anomalies: where Θ base is the baseline threshold, conv(w t ) measures model convergence (higher values indicate stable training), and anomaly rate t represents ... |
| [v12225] | Blockchain-based federated learning methodologies in smart environments https://doi.org/10.1007/s10586-021-03424-yBlockchain-based federated learning methodologies in smart environments --- In , authors combined Blockchain technology and FL using Python, creating Biscotti with the goal of privacy and maintaining the accuracy of FL at the same time. In FL, there ... |
| [v12247] | Preserving Causal Constraints in Counterfactual Explanations for Machine Learning Classifiers https://arxiv.org/abs/1912.03277A key question for the Oracle-based method is the number of labelled CF examples it needs. Using the Adult dataset and the non-decreasing Age constraint, we show the Constraint-Feasibility Score of OracleGenCF as we increase the number of labelled CF... |
| [v12260] | Therefore, a well-defined and robust knowledge base (correctly structuring the syntax and semantic rules of the respective domain) is vital in allowing the machine to generate logical conclusions th http://www.eectod.com/%E0%B8%82%E0%B9%88%E0%B8%B2%E0%B8%A7%E0%B8%9B%E0%B8%A3%E0%B8%B0%E0%B8%8A%E0%B8%B2%E0%B8%AA%E0%B8%B1%E0%B8%A1%E0%B8%9E%E0%B8%B1%E0%B8%99%E0%B8%98%E0%B9%8C/the-third-wave-of-artificial-intelligence-neuro/How to explain the input-output behavior, or even inner activation states, of deep learning networks is a highly important line of investigation, as the black-box character of existing systems hides system biases and generally fails to provide a rati... |
| [v12261] | The AI Agent Stability Gap: Why Your AI Agents Fail in Production (2026) https://hyperion-consulting.io/de/insights/ai-research-decoded-the-2026-stability-gap-what-s-holding-back-your-ai-agentsGDPR compliance: Supports on-device fine-tuning (via LoRA), allowing adaptation to specific voices/faces without external data sharing. Data requirement: Training demands 1,000+ hours of labeled audio-video data per domain. Public datasets (e.g., Vo... |
| [v12267] | Adversarial machine learning https://en.wikipedia.org/?curid=45049676An attacker may poison this data by injecting malicious samples during operation that subsequently disrupt retraining. Data poisoning techniques can also be applied to text-to-image model s to alter their output, which is used by artists to defend th... |
| [v12284] | This course book is protected by copyright. https://studylib.net/doc/26236460/blockchain... record keeping, consensus, independent validation, and an immutable ledger. not all distributed ledgers are implemented with blockchain, blockchain is the primary... |
| [v12298] | EvoCurr: Self-evolving Curriculum with Behavior Code Generation for Complex Decision-making https://arxiv.org/abs/2508.09586EvoCurr: Self-evolving Curriculum with Behavior Code Generation for Complex Decision-making --- with their corresponding types and abilities, environmental settings including map and terrain features, task objectives that define win conditions and ev... |
| [v12311] | Thanks to Advait Jayant (Peri Labs), Sven Wellmann (Polychain Capital), Chao (Metropolis DAO), Jiahao (Flock), Alexander Long(Pluralis Research), Ben Fielding & Jeff Amico (Gensyn), for their insigh https://0xjacobzhao.substack.com/p/the-holy-grail-of-crypto-ai-frontierGensyn's RL Swarm enables decentralized coordination in the post-training phase. Each node runs its own model locally - no gradient synchronization required - allowing efficient operation in heterogeneous, unstable environments. Its workflow mimics R... |
| [v12340] | AI-Powered Optimization of Supply Chain Operations https://www.ibtimes.co.in/ai-powered-optimization-supply-chain-operations-883640Effective solutions build strong data pipelines and assign specialized teams to eliminate silos. Equally vital is computational efficiency - especially in time-sensitive functions. Hybrid cloud-edge architectures have addressed latency and reliabilit... |
| [v12355] | A Survey of Slow Thinking-based Reasoning LLMs using Reinforced Learning and Inference-time Scaling Law https://arxiv.org/abs/2505.02665Xie et al. proposed Guided Beam Search that conducts self-assessment at each step of the beam search algorithm to guide the selection of promising reasoning paths. REINFORCED LEARNING In this section, we summarize the related studies of reinforced... |
| [v12392] | NuGet\Install-Package QuantumSuperposition -Version 1.9.0 https://www.nuget.org/packages/QuantumSuperpositionGeneric superposition engine for QuBit and Eigenstates: arithmetic, comparisons and LINQ style queries over many possible values at once with complex weights, sampling, entanglement and non observational operations. Physics flavoured quantum system:... |
| [v12403] | Graph Defense Diffusion Model https://doi.org/10.1145/3770854.3780207Graph Neural Networks (GNNs) are highly vulnerable to adversarial attacks, which can greatly degrade their performance. Existing graph purification methods attempt to address this issue by filtering attacked graphs.... |
| [v12421] | An earlier version of this post is on the RISELab blog. https://bair.berkeley.edu/blog/2018/12/12/rllib/Similarly, policy-gradient algorithms like A3C and PPO may struggle in multi-agent settings, as the credit assignment problem becomes increasingly harder with more agents.... |
| [v12449] | JudgeMeNot: Personalizing Large Language Models to Emulate Judicial Reasoning in Hebrew https://arxiv.org/abs/2604.18041In contrast, doubling the rank yields only a modest +0.77 BLEU increase and negligible changes in semantic and style scores. These results indicate diminishing returns from increasing adapter rank, while additional training examples continue to impro... |
| [v12472] | Resilient Multi-Dimensional Consensus and Distributed Optimization against Agent-Based and Denial-of-Service Attacks https://arxiv.org/abs/2510.06835On the one hand, adversarial agents including malicious, Byzantine, or stubborn ones can drive the normal agents' states outside the desired region . On the other hand, attacks launched at the communication links, such as DoS attacks, can prevent inf... |
| [v12525] | A Unified Framework for Evaluating and Enhancing the Transparency of Explainable AI Methods via Perturbation-Gradient Consensus Attribution https://arxiv.org/abs/2412.03884Second, we introduce Perturbation-Gradient Consensus Attribution (PGCA), which fuses grid-based perturbation importance with Grad-CAM++ through consensus amplification and adaptive contrast enhancement, combining perturbation fidelity with gradient-b... |
| [v12549] | A dual-layered robust design optimization framework for nonlinear assembly processes using uncertainty-aware deep ensemble and metaheuristic algorithms https://doi.org/10.2139/ssrn.6255261By integrating Deep Ensemble with Monte Carlo Dropout, the proposed model not only provides precise multi-target predictions for six performance metrics but also quantifies aleatoric and epistemic uncertainties, ensuring high predictive reliability i... |
| [v12560] | GitHub - erwanlemerrer/awesome-audit-algorithms: A curated list of algorithms and papers for auditing black-box algorithms. https://github.com/erwanlemerrer/awesome-audit-algorithmsAuditing fairness under unawareness through counterfactual reasoning - (Information Processing & Management) Shows how to unveil whether a black-box model, complying with the regulations, is still biased or not. XAudit : A Theoretical Look at Auditi... |
| [v12585] | Adaptive Collaboration of Arena-Based Argumentative LLMs for Explainable and Contestable Legal Reasoning https://arxiv.org/abs/2602.18916Crucially, our framework supports a Human-in-the-Loop (HITL) contestability workflow, enabling users to directly audit and modify the underlying reasoning graph to influence the final judgment. Empirical evaluations on the LegalBench benchmark demons... |
| [v12624] | Weakest Link in the Chain: Security Vulnerabilities in Advanced Reasoning Models https://arxiv.org/abs/2506.13726However, this overall trend masks significant category-specific differences: for certain attack types the reasoning models are substantially more vulnerable (e.g., up to 32 percentage points worse on a tree-of-attacks prompt), while for others they a... |
| [v12699] | Resilient Dynamic Average Consensus based on Trusted agents https://doi.org/10.48550/arxiv.2303.08171Next we define a connectivity property of the graph from . Definition 1 (Connected Dominating Set (CDS)): A set S of graph Γ = (V, E) is a CDS if all nodes belonging to S form a connected graph, and each node which does not belong to S has at least ... |
| [v12723] | Tree-of-Reasoning: Towards Complex Medical Diagnosis via Multi-Agent Reasoning with Evidence Tree https://doi.org/10.48550/arXiv.2508.03038Considering that most of the existing medical datasets are singlesource medical data, To evaluate different methods under complex medical diagnosis scenario, we collect real patient data from a realworld hospital, which included patient information (... |
| [v12791] | Center for Information and Language Processing https://doi.org/10.48550/arxiv.2305.14250Additionally, it performs joint reasoning across answer candidates and operates at a much larger scale (e.g., over 350 nodes on average for each question) and with a variety of constraint types. REFLEX: Our Approach Belief Graphs Our belief graphs... |
| [v12800] | Privacy-Preserving Federated Learning with Adaptive Noise Scaling and Enhanced CNN Models https://doi.org/10.37745/ejcsit.2013/vol13n52126137Differential privacy (DP) provides formal guarantees but often degrades performance, especially in non-independent and identically distributed (non-IID) settings. This work proposes an adaptive noise scaling mechanism to integrate DP into FL more eff... |
| [v12837] | Adaptive homomorphic federated learning framework for multi-institutional medical imaging with optimized diagnostic accuracy https://pubmed.ncbi.nlm.nih.gov/42082627/NASFL combines multi-level homomorphic encryption (MLHE) and stochastic differential privacy to provide patient confidentiality while using a transformer-guided ResNet backbone for adaptive multi-modal feature fusion between X-ray and CT imaging data... |
| [v12842] | The meeting will be held virtual through Microsoft Teams. https://slim.gatech.edu/content/ML4Seismic-Partners-Meeting-Fall-2021Bayesian inference for ill-posed inverse problems is challenged by the high-dimensionality of the unknown, computationally expensive forward operator, and choosing a prior distribution that accurately encodes prior knowledge on the unknown. To handle... |
| [v12851] | glacier-creative-git/knowledge-graph-traversal-semantic-rag-research: Completed research on semantic retrieval augmented generation through novel knowledge graph traversal algorithms https://github.com/glacier-creative-git/similarity-graph-traversal-semantic-rag-research... for all metrics. This is due to its agnosticism towards the original query; it only traverses based on relevancy to the current chunk. This explains the significant underperformance in 20qa-themes-gpt4omini-reasoning, particularly in faithfulness... |
| [v12874] | Self-Aware Vector Embeddings for Retrieval-Augmented Generation: A Neuroscience-Inspired Framework for Temporal, Confidence-Weighted, and Relational Knowledge https://arxiv.org/abs/2604.20598Feedback poisoning: an adversary who can submit positive feedback can inflate confidence; rate-limits, feedback-source weighting, and anomaly detection are needed. Ripple runaway: dense graphs risk cascade explosion; the hard D max bound and per-hop ... |
| [v12898] | Multi-Timescale, Gradient Descent, Temporal Difference Learning with Linear Options https://arxiv.org/abs/1703.06471Deliberating on large or continuous state spaces have been long standing challenges in reinforcement learning. Temporal Abstraction have somewhat made this possible, but efficiently planing using temporal abstraction still remains an issue. Moreover ... |
| [v12899] | Data science: a natural ecosystem https://doi.org/10.1016/j.inffus.2025.104113Data science: a natural ecosystem --- For this, certain theoretical assumptions on the underlying model are needed.Predictive modeling has been widely adopted by the empirical machine learning community.Donoho argues that the secret sauce boosting p... |
| [v12910] | Human-AI Use Patterns for Decision-Making in Disaster Scenarios: A Systematic Review https://doi.org/10.1109/istas65609.2025.11269624By improving transparency in the AI decision-making process, their study demonstrated that human operators could better understand system behavior, which reduced over-reliance and led to more accurate and contextually grounded decisions.This reinforc... |
| [v12930] | Towards desiderata-driven design of visual counterfactual explainers https://doi.org/10.1016/j.patcog.2025.112811Visual counterfactual explainers (VCEs) are a straightforward and promising approach to enhancing the transparency of image classifiers. ... Similar to methods such as DiffeoCF , ACE , and DiME , we ensure a focus on plausible data transformation x →... |
| [v12954] | On the Convergence of Single-Timescale Actor-Critic https://doi.org/10.48550/arxiv.2410.08868Our analysis shows a sample complexity of O(ϵ -3 ) to compute an ϵ-optimal policy, improving upon the prior best rate of O(ϵ -4 ). ODE-Based Methodology with Direct Global Guarantees: Our core technical innovation is a streamlined ODE-based analysi... |
| [v12976] | Sub-optimality bounds for certainty equivalent policies in partially observed systems https://arxiv.org/abs/2602.02814For models where the cost and the dynamics are smooth in an appropriate sense, we derive upper bounds on the sub-optimality of certainty equivalent policies.We present several examples to illustrate the results. I. INTRODUCTION In many applications... |
| [v12977] | Protein Counterfactuals via Diffusion-Guided Latent Optimization https://arxiv.org/abs/2603.10811Translating counterfactual methods to proteins introduces two fundamental challenges.First, the manifold constraint: Unlike images, proteins are governed by strict epistatic constraints -a single core mutation can abolish folding while a compensatory... |
| [v12981] | Towards Fine-Grained Interpretability: Counterfactual Explanations for Misclassification with Saliency Partition https://doi.org/10.1109/cvpr52734.2025.02797To address this limitation, we propose a fine-grained counterfactual explanation framework that generates both objectlevel and part-level interpretability, addressing two fundamental questions: (1) which fine-grained features contribute to model misc... |
| [v12993] | bartCause is an R package that uses Bayesian Additive Regression Trees (BART) to adjust for confounding variables without making parametric assumptions. https://thinkcausal.org/en/page/bart-cause/If we can appropriately model the outcome, we can impute missing counterfactual outcomes and then find our causal estimates. thinkCausal uses BART for causal inference, taking advantage of its non-parametric, flexible approach to outcome modeling. W... |
| [v13005] | Robust Explainability: A tutorial on gradient-based attribution methods for deep neural networks https://doi.org/10.1109/MSP.2022.3142719Robust Explainability: A tutorial on gradient-based attribution methods for deep neural networks --- In the literature, the terms, attribution, relevance, importance, contribution, sensitivity, and saliency scores are synonymously used. Perturbation-... |
| [v13015] | Tech Mahindra announced collaboration with Microsoft to launch an ontology-driven Agentic AI platform that accelerates telecom and enterprise data modernization. https://digitalterminal.in/tech-companies/tech-mahindra-collaborates-with-microsoft-to-launch-ontology-driven-agentic-ai-platformTech Mahindra announced collaboration with Microsoft to launch an ontology-driven Agentic AI platform that accelerates telecom and enterprise data modernization. 07 Mar 2026, 5:42 am Built on Microsoft Fabric and Azure AI Foundry, the solution enab... |
| [v13037] | Artificial Intelligence will be used to accelerate new medicine discovery in a University of Liverpool partnership secured following Mayor Steve Rotheram's US trade mission. https://news.liverpool.ac.uk/2026/02/05/new-university-of-liverpool-us-collaboration-to-accelerate-drug-discovery-using-ai/Our collaboration with BPGbio, Inc. brings together cutting-edge Bayesian computation, multi-omics research, and secure data environments to deliver exactly that. This is the blueprint for the next generation of precision medicine." Niven R. Narain,... |
| [v13048] | Unifying Adversarial Perturbation for Graph Neural Networks https://doi.org/10.48550/arXiv.2509.00387Specifically, these methods mainly apply perturbation to the node feature, weights or graph structure. suggest dropping edges randomly in adversarial training to generate perturbations on the adjacency matrix A. designs a dynamic regularizer forcin... |
| [v13053] | Non-Intrusive Load Monitoring Model Based on SimCLR and Visualized Color V-I Trajectories https://pubmed.ncbi.nlm.nih.gov/41755171/Initially, unlabeled load data from the source domain (PLAID) and target domain (WHITED) are converted into RGB color V-I trajectories and input into the model. The framework enhances intra-class aggregation through contrastive learning and achieves... |
| [v13054] | Tokenization of Intellectual Property (IP) https://reddit.com/r/BuildOnWYZth/comments/1hv1v1s/tokenization_of_intellectual_property_ip/Enhance transparency and trust through blockchain's immutable ledger. * Enable broader access to IP investment opportunities.... |
| [v13128] | Dual-Modal Lung Cancer AI: Interpretable Radiology and Microscopy with Clinical Risk Integration https://arxiv.org/abs/2604.16104Explainable AI techniques including Grad-CAM, Grad-CAM++, Integrated Gradients, Occlusion, Saliency Maps, and SmoothGrad are applied to provide visual interpretability.... |
| [v13129] | Towards East Asian Facial Expression Recognition in the Real World: A New Database and Deep Recognition Baseline https://www.mdpi.com/1424-8220/22/21/8089Deep learning methods such as convolutional neural networks (CNN) , deep belief networks (DBN) ,deep autoencoders (DAE) , and generative adversarial networks (GAN) are gradually gaining popularity among researchers. CNN relies on a set of learnable ... |
| [v13135] | Reinforcement Learning for Decision-Level Interception Prioritization in Drone Swarm Defense https://doi.org/10.48550/arxiv.2508.00641The rapid proliferation of unmanned aerial vehicles has spurred a surge in research on autonomous defense systems capable of detecting, prioritizing, and neutralizing aerial threats, particularly in swarm-based attack scenarios.These efforts span mul... |
| [v13163] | In an era where data privacy concerns increasingly shape public acceptance of digital health technologies, a new study states that advanced AI does not have to come at the cost of patient confidentia https://www.devdiscourse.com/article/technology/3791526-privacy-first-ai-models-bring-breakthrough-in-iot-based-healthcareErrors tend to occur in borderline cases, such as early-stage disease or intermediate biomarker values, highlighting the importance of integrating AI outputs with clinical decision support rather than using them in isolation. This reinforces the view... |
| [v13176] | GoDaddy Inc.: DEF 14A (DEF 14A) https://www.sec.gov/Archives/edgar/data/0001609711/0001609711-26-000030-index.htm2025 Peer Group Akamai Technologies, Inc. (NASDAQ: AKAM) Autodesk, Inc. (NASDAQ: ADSK) Docusign, Inc. (NASDAQ: DOCU) eBay Inc. (NASDAQ: EBAY) Fortinet, Inc. (NASDAQ: FTNT) Gen Digital Inc. (NASDAQ: GEN) HubSpot, Inc. (NYSE: HUBS) Nutanix, Inc. (NASDA... |
| [v13179] | Toward Individual Fairness Without Centralized Data: Selective Counterfactual Consistency for Vertical Federated Learning https://arxiv.org/abs/2605.07117Our focus is on individual-level counterfactual stability, i.e., per-instance prediction consistency under protected-attribute interventions as formalized in the causal fairness literature, rather than group parity guarantees such as demographic pari... |
| [v13206] | SkillGraph: Self-Evolving Multi-Agent Collaboration with Multimodal Graph Topology https://arxiv.org/abs/2604.17503Conditioning the topology predictor on textual agent profiles alone is therefore insufficient. To capture this visual dependency, we introduce the Multimodal Graph Transformer (MMGT), a five-stage encoder that jointly processes image patches, questio... |
| [v13219] | Employ Blockchain to Boost Cloud Computing Cybersecurity: Product Data Integrity and Appropriate Access with Smart Contract Regulations https://doi.org/10.1109/ICTBIG68706.2025.11323968With blockchain-based decentralized, append-only, immutable ledger and smart contract programmability, the architecture supports secure data sharing, auditable trails, enforceable access rule automation that is not dependent on central parties. The b... |
| [v13235] | Article: Virtual Panel: What to Consider when Adopting Large Language Models https://www.infoq.com/articles/llm-adoption-considerations/For a lot of enterprises, their LLM applications will be touching fairly business-sensitive data, and for them it may be important that they control the model that sees that data. Secondly, customizability. When you self-host models you control all ... |
| [v13262] | Constructive Distortion: Improving MLLMs with Attention-Guided Image Warping https://doi.org/10.48550/arXiv.2510.09741Finally, note that we intervene before feature extraction, while the above methods operate after the image has already been encoded, often from features that have already lost critical spatial detail (Pantazopoulos et al., 2024). In summary, our key ... |
| [v13265] | Efficient Low-Rank GNN Defense Against Structural Attacks https://doi.org/10.1109/ickg59574.2023.00006Many approaches to defend GNNs against adversarial attacks have been proposed.Some works utilize pre-processing methods to filter the perturbed graph structure prior to the training stage , . (2023)... |
| [v13275] | Building Trustworthy AI by Addressing its 16+2 Desiderata with Goal-Directed Commonsense Reasoning https://doi.org/10.48550/arxiv.2506.126672 Background: s(CASP) s(CASP), by Arias et al. (2018), is a novel non-monotonic reasoner that evaluates Constraint Answer Set Programs without a grounding phase either before or during execution.s(CASP) supports predicates and thus retains logical va... |
| [v13307] | From Load Tests to Live Streams: Graph Embedding-Based Anomaly Detection in Microservice Architectures https://arxiv.org/abs/2604.06448Does introducing a synthetic load along a selected call path improve anomaly detection evaluation?Answering this required careful design, as injecting synthetic anomalies is inherently nontrivial.Naively adding noise can yield ambiguous results, espe... |
| [v13333] | I recently released "Language Models Don't Always Say What They Think: Unfaithful Explanations in Chain-of-Thought Prompting" with collaborators Julian Michael, Ethan Perez, and Sam Bowman. https://www.lesswrong.com/posts/6eKL9wDqeiELbKPDj/unfaithful-explanations-in-chain-of-thought-promptingI recently released "Language Models Don't Always Say What They Think: Unfaithful Explanations in Chain-of-Thought Prompting" with collaborators Julian Michael, Ethan Perez, and Sam Bowman. In this post, I briefly elaborate on motivations/implication... |
| [v13336] | Deep Reinforcement Learning for Decentralized Multi-Robot Exploration With Macro Actions https://doi.org/10.1109/lra.2022.3224667Between MDPs and semi-MDPs: A framework for temporal abstraction in reinforcement learning. R S Sutton, D Precup, S Singh, Artif. Intell. 1121/2R. S. Sutton, D. Precup, and S. Singh, "Between MDPs and semi-MDPs: A framework for temporal abstraction i... |
| [v13375] | Circular Economy and Green Environment https://www.mdpi.com/journal/ijerph/special_issues/Circular_Economy_Green_EnvironmentTo obtain a thorough understanding and explanation of the influencing mechanism of environmental regulation (ER) on green innovation efficiency (GIE), the super-slack based measure-data envelopment analysis (Super-SBM-DEA) method was applied to evalu... |
| [v13405] | CDC Workshop on Decentralization in Teams and Games, Dec 2025. https://adityam.github.io/talks.htmlCDC Workshop on Decentralization in Teams and Games, Dec 2025. Agent-state based policies in POMDPs: Beyond belief-state MDPs (slides) (video) ... Sub-optimality bounds for certainty equivalence policies in POMDPs (slides) CDC Workshop on Decentral... |
| [v13407] | Machine learning-based discovery of informative SNPs for population assignment through whole genome sequencing https://doi.org/10.1186/s12864-025-12322-1M E Hossain, M A Kabir, L Zheng, D L Swain, S Mcgrath, J Medway, Artif Intell Agric. 62022 Classification and regression by randomforest. A Liaw, M Wiener, Forest. 232001 Support Vector Machines * the interface to libsvm in package e1071. D Meyer, ... |
| [v13414] | Adversarial Robustness in AI-Driven Cybersecurity Solutions: Thwarting Evasion Assaults in Real-Time Detection Systems https://doi.org/10.22161/ijaems.115.9Malicious entities create subtle alterations in network traffic or system actions that mislead AI models into misidentifying threats as harmless, facilitating evasion tactics that can circumvent real-time intrusion detection systems (IDS). This study... |
| [v13444] | Discover how social media verification methods inspire robust AI authenticity practices to build trust and model integrity. https://fuzzypoint.net/how-to-verify-authenticity-in-ai-systems-insights-from-mediaYes, which is why cryptographic anchoring and continuous adversarial testing are crucial for maintaining model integrity. How does user trust improve with AI transparency? When AI systems explain their processes clearly and allow user feedback, tru... |
| [v13478] | Real-Time Distributed Model Predictive Control with Limited Communication Data Rates. (arXiv:2208.12531v2 [eess.SY] UPDATED) http://arxiv.org/abs/2208.12531... multi-agent systems (MASs) necessitates communication between agents, yet the consequence of communication data rates is typically overlooked. This work focuses on developing stability-guaranteed control methods for MASs with limited data rate... |
| [v13496] | The phenomenon of multimodal LLM hallucination represents one of the most critical challenges facing the deployment of large vision-language models in real-world applications. https://www.libertify.com/interactive-library/multimodal-llm-hallucination-survey/A model might describe objects not present in an image, assign wrong colors or sizes to visible objects, or fabricate spatial relationships that contradict the actual visual scene. These hallucinations pose substantial obstacles to practical deployme... |
| [v13727] | Human-computer interaction (HCI) is a multidisciplinary field of study that focuses on how people interact with technology. https://computing.njit.edu/human-computer-interaction-0Research Areas: human-AI teaming, interactive visualization, visual analytics, responsible AI, humanmachine communication Human-AI Collaboration using Visual Analytics... |
| [v13729] | The Hessian of tall-skinny networks is easy to invert https://doi.org/10.48550/arXiv.2601.06096Given a way to compute the Hessian-vector product, one can indirectly compute the Hessian-inverse-vector product via, say Krylov iterations like Conjugate Gradient as proposed by Pearlmutter and more recently re-investigated . However, the quality of... |
| [v13741] | System And Method For Improved Structural Discovery And Representation Learning Of Multi-agent Data https://worldwide.espacenet.com/patent/search?q=EP4034962B1The present disclosure generally relates to a system, non-transitory computer readable medium, and method for learning player distribution and role assignments in sports. Background Increasingly, sports fans and data analysts have become entrenched... |
| [v13743] | Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity Games https://doi.org/10.1109/eurospw59978.2023.00056The result is a model inspired by both bounded rationality and ToM. Experimental results comparing this model with a strategy that attempts to optimally learn to maximize utility, the upper confidence bound model, demonstrates the benefit of the prop... |
| [v13807] | Bipedal Action Model For Humanoid Robot https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260124750).pnThese systems lack the temporal consistency needed for smooth, long-horizon tasks and are not robust enough to adapt to the unpredictable nature of real-world environments.... |
| [v13839] | by Jan Betley, Owain_Evans https://www.lesswrong.com/posts/ifechgnJRtJdduFGC/emergent-misalignment-narrow-finetuning-can-produce-broadlyI'd be interested in knowing more about how the fine-tuning is regularized and the strength of any KL-divergence-penalty-ish terms. I'm not clear on how the openai fine-tuning API works here with default hypers. By default, I would expect that optim... |
| [v13867] | Ev-Trust: A Strategy Equilibrium Trust Mechanism for Evolutionary Games in LLM-Based Multi-Agent Services https://doi.org/10.48550/arXiv.2512.16167Unlike traditional static or centralized reputation systems, Ev-Trust redefines trust as a dynamic and self-organizing process that drives strategic adaptation in open multi-agent ecosystems. By embedding both direct and indirect trust into agents' e... |
| [v13875] | Towards Explainable Federated Learning: Understanding the Impact of Differential Privacy https://doi.org/10.48550/arxiv.2602.10100For instance, a malicious FL server can run a Gradient Inversion or a Membership Attack to obtain sensitive data. In order to achieve both, data privacy and explainability, this paper proposes a FL solution, called Federated EXplainable Trees with... |
| [v13878] | Abstract (296) HTML (9) PDF (2950KB)(1687) Knowledge map Save https://www.joca.cn/EN/article/showDownloadTopList.doThen, by establishing the SGAM (Spatial Global relationship Attention Module) and CGAM (Channel Global Attention Module), the spatial global relationship mechanism and channel attention mechanism were introduced to capture global information, so as t... |
| [v13909] | "domain": "Prompt Injection & Jailbreak Defense", "concept": "Probabilistic Output Manipulation via Logit Probing", "difficulty": "Hard", "text": "Explain how an attacker can perform a 'Jailbreak by https://huggingface.co/datasets/Roman1111111/gemini-3.1-pro-hard-high-reasoning### DEFENSE ARCHITECTURE: Recursive Epistemic Gating (REG) **Concept:** Treat the Chain-of-Thought (CoT) not as a continuous generation stream, but as a series of atomic, verifiable transactions. The model is effectively "paused" after every newline ... |
| [v13930] | Hybrid Agentic AI and Multi-Agent Systems in Smart Manufacturing https://doi.org/10.1016/j.jmsy.2026.04.002In contrast, Small Language Models (SLMs) offer a lightweight, privacy-preserving complement.Deployed locally on edge devices or factory nodes, SLMs can provide lowlatency reasoning, rapid diagnostics, and continuous monitoring without reliance on ex... |
| [v13947] | AI is about to put a whole new spin on virtual communication https://www.inverse.com/innovation/how-smart-replies-could-improve-socially-distanced-communicationsAI-mediated communication (AI-MC) represents a new paradigm where communication is augmented or generated by an intelligent system. As AI-MC becomes more prevalent, it is important to understand the effects that it has on human interactions and inter... |
| [v13976] | Trust-Based Assured Sensor Fusion in Distributed Aerial Autonomy https://doi.org/10.48550/arxiv.2507.17875Thus, UAV data fusion needs specialized trust frameworks-to the best of our knowledge, none existed before this work. Trust-Based Fusion with Bayesian Principles We formulate a joint problem of trust estimation and sensor fusion using a hidden Mark... |
| [v14059] | 12.6.2025 Paper discussion: InstaSHAP: Interpretable Additive Models Explain Shapley Values Instantly. http://tml.cs.uni-tuebingen.de/teaching/tml_graduate_seminar/past_tml_graduate_seminar.php9.2.2022 (paper discussion) Denoising Diffusion Probabilistic Models pdf, helpful blog posts here and here, Jonathan Ho, Ajay Jain, Pieter Abbeel, 2020.... |
| [v14084] | PatientEase - Domain-Aware RAG for Rehabilitation Instruction Simplification https://doi.org/10.3390/bioengineering12111204A summary table that follows lays out each stripped version next to the full model for easy comparison Table 3.An ablation experiment confirms that the PatientEase system's inner components perform unique, non-replaceable roles.The user-situated retr... |
| [v14162] | Enabling verifiability in federated learning utilizing zero-knowledge proofs and blockchain https://doi.org/10.1109/AIAHPC66801.2025.11290017To address the absence of process-level verifiability in federated learning, a verifiable architecture, zero-knowledge proof-verified and blockchain-audited federated learning (zk-BcFed), is proposed by integrating zero-knowledge proofs with blockcha... |
| [v14177] | MedRule-KG: A Knowledge-Graph-Steered Scaffold for Reliable Mathematical and Biomedical Reasoning https://doi.org/10.48550/arXiv.2511.12963The monotonic increase in EM with dataset size further indicates that improvements are not artifacts of small-sample variability. Moreover, the flattening of the curve for the KG + Verifier system suggests saturation at high performance, implying tha... |
| [v14183] | Imagine you are a loan officer faced with a model that says "deny" for a borrower's application. https://legacy.thenextgentechinsider.com/flex-unlocking-feature-importance-with-counterfactual-explanations/Computational cost Counterfactual generation ≈ O(N C) + cheap aggregation; comparable to sampling-based SHAP for modest C Sampling-based SHAP ≈ O(N S) with S ≈ 100-200 model queries Very cheap locally (one linear fit), but must be repeated for many n... |
| [v14190] | Comorbidity Classification from Clinical Free-Text using Large Language Models: Application to Sleep Disorder Patients https://doi.org/10.1007/s10916-026-02343-yThe evaluation presented in this study is computational in nature and was conducted on prospectively scored comorbidity annotations.As a first study of its kind within this dataset, it is intended to lay the methodological foundation and provide init... |
| [v14201] | Provable Defense Framework for LLM Jailbreaks via Noise-Augumented Alignment https://arxiv.org/abs/2602.01587This approach preserves the positional indices of the retained tokens and maintains the structural integrity of the prompt without introducing foreign tokens into the vocabulary.We present theoretical guarantee in Appendix. Noise-Augmented Alignment... |
| [v14244] | TRAM: Bridging Trust Regions and Sharpness Aware Minimization https://arxiv.org/abs/2310.03646We propose Trust Region Aware Minimization (TRAM), a SAM algorithm fine-tuning for low parameter sharpness and smooth, informative representations preserving pre-trained structure. TRAM uses a trust region bound to inform the SAM adversarial neighbor... |
| [v14295] | DVD: Dynamic Contrastive Decoding for Knowledge Amplification in Multi-Document Question Answering https://doi.org/10.18653/v1/2024.emnlp-main.266Prior research in RAG has introduced various improvements (Vu et al., 2023), such as improving retrieval quality (Shi et al., 2023d;Xu et al., 2023), refining responses through multiple iterations (Peng et al., 2023;Li et al., 2024), using optimized ... |
| [v14358] | Lost in Decoding? Reproducing and Stress-Testing the Look-Ahead Prior in Generative Retrieval https://doi.org/10.1145/3805712.3808567Planning Ahead in Generative Retrieval (PAG) mitigates this failure mode by using simultaneous decoding to compute a document-level look-ahead prior that guides subsequent sequential decoding. We reproduce PAG at inference time and stress-test its de... |
| [v14366] | The Architectural Evolution of Intelligence: A Formal Taxonomy of the AI Technology Stack https://www.c-sharpcorner.com/article/the-architectural-evolution-of-intelligence-a-formal-taxonomy-of-the-ai-technol/A* Search applies an admissible heuristic function h(n) one that never overestimates the true cost to guide best-first expansion of a state-space graph, guaranteeing optimal path discovery in O(b^d) time complexity where b is the branching factor and... |
| [v14404] | We generate a data set with 5,000 observations assigned over 5 equally sized batches, with 10 covariates and 4 treatment arms. https://ftp2.osuosl.org/pub/cran/web/packages/banditsCI/vignettes/banditsCI.html... main = paste0("Assignment for arm ", k)) graphics::abline(v=cumsum(batch_sizes_w), col="#00ccff") graphics::legend("topleft", legend = 1:K, col=1:K, lty=1:K, lwd = 3) Estimating response. We then generate augmented inverse probability weighte... |
| [v14411] | Challenges in Credit Assignment for Multi-Agent Reinforcement Learning in Open Agent Systems https://doi.org/10.48550/arXiv.2510.27659For the empirical analyses, we evaluate two representative algorithms, i.e., Deep Q-Network (DQN) for TCA, and Multi-Agent PPO (MAPPO) for SCA, respectively. Each method is adapted to operate in an environment with openness. To measure the impact o... |
| [v14441] | The Overfocusing Bias of Convolutional Neural Networks: A Saliency-Guided Regularization Approach https://arxiv.org/abs/2409.17370Our SGDrop framework leverages attribution methods to regularize neural network training by selectively dropping the most salient pieces of information.Crucially, it is designed to be universally applicable and remains agnostic to the specific choice... |
| [v14442] | MARVEL: A Multi Agent-based Research Validator and Enabler using Large Language Models https://doi.org/10.48550/arxiv.2601.03436It scores on a 0-1 scale for relevance and factual correctness relative to both the question and the provided context, with higher scores awarded for responses that cite evidence and a score of 0 assigned to responses that state an inability to answe... |
| [v14482] | Spatial Lifting for Dense Prediction https://doi.org/10.48550/arxiv.2507.10222Providing reliable estimates of prediction uncertainty or quality is vital for deploying models in critical applications.Common approaches include Monte Carlo dropout , forming ensembles of models, or developing explicitly Bayesian neural networks, a... |
| [v14581] | Foundation Models for Causal Inference via Prior-Data Fitted Networks https://arxiv.org/abs/2506.10914Then, we propose a concrete instantiation using Bayesian neural networks and provide a learning algorithm that leverages the SCM's ability to simulate counterfactual data and perform consistent Bayesian inference in a wide range of causal inference s... |
| [v14584] | LLM Inference Enhanced by External Knowledge: A Survey https://doi.org/10.48550/arXiv.2505.24377These hybrid methods leverage the strengths of both symbolic and neural reasoning to overcome the limitations of either approach, making them particularly suitable for complex reasoning. Knowledge Graph (KG) Integration KG integration approaches var... |
| [v14668] | F Common Vulnerabilities in Internet of Things Security and How to Address Them? - https://www.thenetworkdna.com/2025/07/common-vulnerabilities-in-internet-of.htmlA concise, detailed answer explains that the discipline blends traditional network controls with device-specific safeguards such as signed bootloaders, low-power encryption ciphers, and life-cycle-aware asset tracking. Anchoring your strategy to that... |
| [v14694] | FORT-IDS: a federated, optimized, robust and trustworthy intrusion detection system for IIoT security https://doi.org/10.1038/s41598-025-31025-xThe federated experiments in this paper therefore report round-wise behaviour under a many-client non-IID setting with K = 20 clients and client fraction C = 0.2 and show FedAvg aggregated accuracy converging to 0.934 by round five under our leakage-... |
| [v14739] | Large Language Models Encode Semantics and Alignment in Linearly Separable Representations https://arxiv.org/abs/2507.097091), though compression patterns vary by architecture and do not universally follow the U-shaped trends reported in prior work (Ansuini et al., 2019;Valeriani et al., 2023;Razzhigaev et al., 2024;Skean et al., 2025). Geometric encoding of alignment: i... |
| [v14855] | Mediation analysis to identify causes of racial disparity in health outcomes: a comparison of model-based and outcome-based approaches https://doi.org/10.1186/s12874-026-02776-6The estimator for PA is:5 The standard error of the PA is estimated using the Delta method, a general method for deriving the variance of a function of asymptotically normal random variables with known variance. This estimation incorporates counterfa... |
| [v14893] | FLARE: Adaptive Multi-Dimensional Reputation for Robust Client Reliability in Federated Learning https://arxiv.org/abs/2511.14715FLARE: Adaptive Multi-Dimensional Reputation for Robust Client Reliability in Federated Learning --- FLARE integrates: (i) a multi-dimensional reputation score capturing performance consistency, statistical anomaly indicators, and temporal behavior, ... |
| [v14894] | Dell Technologies is on the lookout for an AI-ML Engineer MCP-Agentic to fill the vacancy in its Hyderabad office. https://www.analyticsinsight.net/job-openings/ai-ml-engineer-mcp-agentic-dellApply multi-agent orchestration to allow for self-governing decision-making and task assigning. Train AI models for identifying attacks, spotting deviations, and conducting user behavioral study. Establish guidelines for AI observability, monitorin... |
| [v14955] | Toward a Graph-Theoretic Model of Belief: Confidence, Credibility, and Structural Coherence https://doi.org/10.48550/arXiv.2508.03465In this framework, each node represents an individual belief, while edges encode epistemic relationships-such as support, contradiction, or qualification-between beliefs. Crucially, each belief is endowed with two distinct attributes: credibility, wh... |
| [v15041] | The silent infrastructure: How Hassan's AI systems are quietly redefining cloud defense https://www.digitaljournal.com/tech-science/the-silent-infrastructure-how-hassans-ai-systems-are-quietly-redefining-cloud-defense/articleTransparent audit flags to ensure human interpretability of alerts Security systems should not become surveillance systems, Hassan writes.... |
| [v15053] | Amplification of formal method and fuzz testing to enable scalable assurance for communication system https://patents.google.com/?oq=18628625The method of claim 1, further comprising a step of establishing dependency relationships through cross-attention mechanisms and/or self-attention mechanisms. ... The amplification of the formal method and fuzz testing provides a general approach to ... |
| [v15059] | Integrating Reinforcement Learning with Visual Generative Models: Foundations and Advances https://doi.org/10.48550/arXiv.2508.10316Key contributions include MADDPG , which introduced centralized training with decentralized execution, allowing agents to condition their critics on global information during training while executing independently at test time. Other approaches, such... |
| [v15123] | AI Triage Failure: When Moving Fast Becomes a Risk | HackerNoon https://hackernoon.com/ai-triage-failure-when-moving-fast-becomes-a-riskThe Shift : From AI Projects to AI Products After those failures, we hit reset. We stopped thinking of AI as a "proof of concept" or "quick win." We started treating it like any long-living product - with versions, feedback loops, governance, and a... |
| [v15126] | A Roadmap towards Intelligent Operations for Reliable Cloud Computing Systems https://doi.org/10.48550/arxiv.2310.00677Although cloud management frameworks provide automatic mechanisms for failure recovery, unplanned service failures may still cause severe cascading effects.Therefore, it is crucial to evaluate the impact of service failures rapidly and accurately for... |
| [v15154] | Tri-LLM Cooperative Federated Zero-Shot Intrusion Detection with Semantic Disagreement and Trust-Aware Aggregation https://doi.org/10.48550/arXiv.2602.00219In contrast to centralized systems that frequently degrade under heterogeneous data distributions, the proposed Tri-LLM framework maintains consistent performance even when client semantics vary substantially. This robustness arises from semantic ali... |
| [v15167] | Primary focus: planning and shipping a production - ready chatbot integration powered by LLMs (e.g., OpenAI API) that becomes a real business asset - not a lab demo. https://towerhousestudio.com/blog/ai-chatbot-implementation-strategy/List assumptions and dependencies that could delay delivery. Define acceptance criteria and exit criteria for the pilot. Data and retrieval. Which sources will be indexed and how access is granted. How sensitive data is handled, chunked, embedded, f... |
| [v15179] | MIRROR: A Multi-Agent Framework with Iterative Adaptive Revision and Hierarchical Retrieval for Optimization Modeling in Operations Research https://doi.org/10.48550/arXiv.2602.03318Systems like Chain-of-Experts (Xiao et al., 2023), OptiMUS (Ahmaditeshnizi et al., 2024), and ORMind (Wang et al., 2025) decompose complex modeling tasks into specialized roles and enable iterative interaction among agents, offering a flexible and pr... |
| [v15224] | Finding and fixing a harmful behavior that WAS represented in the SAE training data in a way that is competitive with appropriate fine-tuning and machine unlearning baselines. https://www.lesswrong.com/posts/HYkg6kwqhCQT5uYuK/eis-xv-a-new-proof-of-concept-for-useful-interpretabilityFinding and fixing a harmful behavior that WAS CONVINCINGLY NOT represented in the SAE training data in a way that is competitive with appropriate fine-tuning and machine unlearning baselines. The reward model sycophancy behavior was developed by th... |
| [v15305] | The Dual Role of Abstracting over the Irrelevant in Symbolic Explanations: Cognitive Effort vs. Understanding https://arxiv.org/abs/2602.03467Just as image classification explanations use saliency maps to highlight relevant pixels while treating the rest as irrelevant (Ribeiro et al., 2016), symbolic representations must distinguish between essential logical pivots and distracting details ... |
| [v15313] | TranSimHub:A Unified Air-Ground Simulation Platform for Multi-Modal Perception and Decision-Making https://doi.org/10.48550/arXiv.2510.15365Dynamic entities include vehicles, pedestrians, and UAVs, which are controlled through predefined engines such as SUMO, or alternatively by user-defined strategies. Both ground and aerial agents support policy-level customization, allowing integratio... |
| [v15343] | In my previous blog, we explored the evolution of information retrieval techniques from simple keyword matching to sophisticated context understanding and introduced the concept that sparse embedding https://dev.to/zilliz/exploring-bge-m3-and-splade-two-machine-learning-models-for-generating-sparse-embeddings-22p1"Learned" sparse embeddings are an advanced type of embedding that combines the precision of traditional sparse embeddings with the semantic richness of dense embeddings. They enhance the sparse retrieval approach by incorporating contextual informat... |
| [v15368] | "Learnings from Paying Artists Royalties for AI-Generated Art: A Retrospective on Tess.Design, Our Attempt to Make an Ethical, Artist-Friendly AI Marketplace. https://gwern.net/doc/ai/nn/diffusion/index"Learnings from Paying Artists Royalties for AI-Generated Art: A Retrospective on Tess.Design, Our Attempt to Make an Ethical, Artist-Friendly AI Marketplace. ... DPM-Solver: A Fast ODE Solver for Diffusion Probabilistic Model Sampling in Around 10 S... |
| [v15436] | scGCN is a graph convolutional networks algorithm for knowledge transfer in single cell omics - News Break https://www.newsbreak.com/news/2288228997400/scgcn-is-a-graph-convolutional-networks-algorithm-for-knowledge-transfer-in-single-cell-omicsIn this work, we use these graph measures to explore the robustness of various ANNs to adversarial attacks. To this end, we (1) explore the design space of inter-layer and intra-layers connectivity regimes of ANNs in the graph domain and record their... |
| [v15437] | AgentRx: Diagnosing AI Agent Failures from Execution Trajectories https://doi.org/10.48550/arXiv.2602.02475The list of recorded failures gives a causal chain from the first unrecoverable failure to the terminal one. A Cross-Domain Failure Taxonomy Prior work takes a system-level view of multi-agent failures, organizing failure modes by design, coordinati... |
| [v15455] | Moscow Exchange to Follow up BTC Futures Launch With Crypto Funds, Structured Bonds | MEXC News https://www.mexc.com/lv-LV/news/21251In the entire AI Agent protocol stack, we divided it into three main layers in our previous research report, namely Agent Infrastructure Layer: This layer provides the lowest-level operational support for agents and is the technical foundation for al... |
| [v15471] | Method And System For Recording And Enforcing Encumbrances On Assets Using Multiple Secure, Immutable Ledgers https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260127563).pnFIG. depicts an exemplary distributed ledger similar to the hybrid distributed ledger environment as shown in FIG. . The example distributed ledger includes a public distributed ledger layer including a blockchain having blocks - of transactions. In ... |
| [v15478] | We introduce 2D-Malafide, a novel and lightweight adversarial attack designed to deceive face deepfake detection systems. https://www.eurecom.fr/fr/publication/7876We introduce 2D-Malafide, a novel and lightweight adversarial attack designed to deceive face deepfake detection systems. ... Additionally, we report an explainability analysis using GradCAM which illustrates how 2D-Malafide misleads detection syste... |
| [v15586] | Light management for image and data control https://patents.google.com/?oq=17555507Light management for image and data control --- This is implementer optional and adjustable and is analogous to the graduating effect of a bright spot removal process wherein "darkening" corrections (LRC actions) that are more peripheral to the centr... |
| [v15822] | Agent health score for agentic automations https://patents.google.com/?oq=19216203For instance, AI agents make use of generative AI models. Generative AI models can generate various types of content, such as text, imagery, audio, and synthetic data. Various types of generative AI models may be used, including, but not limited to, ... |
| [v15831] | Reactive Multi-agent Coordination using Auction-based Task Allocation and Behavior Trees https://doi.org/10.1109/ccta54093.2023.10252961Behavior trees also generalize other popular control structures, such as finite state machines and decision trees , thus increasing its utility as a flexible and versatile framework for automation. C. Contributions With respect to the aforementione... |
| [v15838] | 4 Oct 202566B23F41159AB61353DF219B4E3FE4ADarXiv:2510.03612v1[cs.AI]User query: "Find a Thriller Movie" https://doi.org/10.48550/arxiv.2510.03612Recent studies reveal that these agents are vulnerable against attackers who can bias selection outcomes through preference manipulations using adversarial pop-ups, image perturbations, or content tweaks.Existing work, however, either assumes strong ... |
| [v15909] | Quantum-Inspired Neural Network with Sequence Input () https://scirp.org/journal/paperinformationRef. proposed a neural network model with quantum gated nodes and a smart algorithm for it, which shows superior performance in comparison with a standard error back propagation network. Ref. proposed a weightless model based on quantum circuit. It... |
| [v15921] | This week in deep learning, we bring you Tensorflow Similarity, faster quantized inference with XNNPACK, the world's first 5G and AI enabled drone platform and a paper on transformer-based 3D dance g https://www.deeplearningweekly.com/p/deep-learning-weekly-issue-215A comprehensive introduction to Optimum, an optimization toolkit that provides performance optimization tools targeting efficient AI hardware and built-in collaboration with hardware partners. CARLA: A Python Library to Benchmark Algorithmic Recours... |
| [v16000] | LLM/Agent-as-Data-Analyst: A Survey https://doi.org/10.48550/arxiv.2509.23988The Extractor-Reasoner-Executor paradigm extracts relevant context, generates logic rules or equations, and executes them via LLM prompting to get the final answer.Similarly, S3HQA uses a retriever to filter heterogeneous resources, a selector to i... |
| [v16027] | SocialJax: An Evaluation Suite for Multi-agent Reinforcement Learning in Sequential Social Dilemmas https://doi.org/10.48550/arxiv.2503.14576However, using a common reward structure can exacerbate the credit assignment problem.Specifically, if an agent takes an arbitrary action concurrently with a teammate who performs a successful action generating a reward, the agent may mistakenly attr... |
| [v16044] | DocSync: Agentic Documentation Maintenance via Critic-Guided Reflexion https://arxiv.org/abs/2605.02163DocSync bridges syntactic changes and natural language descriptions by fusing Abstract Syntax Tree (AST) representations and Retrieval-Augmented Generation (RAG) to provide dependency-aware context. Furthermore, to ensure factual consistency, we inco... |
| [v16046] | Throughout this essay, I use "mathematical fluency" to mean something specific: not manual derivations or rote memorization, but structural literacy - the ability to recognize when seemingly disparat https://www.insights.phyusionbio.com/p/the-end-of-disciplinary-sovereigntyTechniques originally developed in one field are rapidly generalized and redeployed elsewhere. Causal discovery methods from econometrics now inform drug target identification. Transformer architectures - initially designed for natural language proce... |
| [v16089] | Generative Image Layer Decomposition with Visual Effects https://doi.org/10.1109/cvpr52734.2025.00716Petru-Daniel Tudosiu, Yongxin Yang, Shifeng Zhang, Fei Chen, Steven Mcdonagh, Gerasimos Lampouras, Ignacio Iacobacci, Sarah Parisot, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. the IEEE/CVF Conference on Compute... |
| [v16090] | A Comprehensible Explanation of the Dimensions in CNNs - News Break https://www.newsbreak.com/news/2289464574587/a-comprehensible-explanation-of-the-dimensions-in-cnnsIn this paper, we introduce a novel framework that harnesses explainable ML methods to guide high-fidelity assessment of ML evasion attacks. Our framework enables explanation-guided correlation analysis between pre-evasion perturbations and post-evas... |
| [v16104] | 12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.htmlSuch adversarial attacks are called prompt injections, which occur when an attacker manipulates a generative artificial intelligence (GenAI) system through crafted inputs, causing the LLM to unknowingly produce otherwise prohibited content. Recent f... |
| [v16149] | This package shows how to multiply the inverse of the Hessian of a deep network with a vector. https://vuink.com/post/tvguho-d-dpbz/a-rahimi/hessianPearlmutter showed a clever way to compute the Hessian-vector-product for a deep net. By contrast, the paper and code in this repo shows how to compute the Hessian-inverse-product, the product of the inverse of the Hessian of a deep net with a vector... |
| [v16190] | Individual Contributions as Intrinsic Exploration Scaffolds for Multi-agent Reinforcement Learning https://doi.org/10.48550/arxiv.2405.18110... z t ), known as the noisy TV problem (Schmidhuber, 2010).Our focus is primarily on the individual contribution r i t,int , which necessitates a specific measurement method to effectively distinguish the contribution of agent i's action u i t and ... |
| [v16195] | Detecting Adversarial Data via Perturbation Forgery https://doi.org/10.48550/arXiv.2405.16226Although previous detection methods achieve high performance in detecting gradient-based adversarial attacks, new attacks based on generative models with imbalanced and anisotropic noise patterns evade detection. Even worse, existing techniques eithe... |
| [v16222] | Amplification of formal method and fuzz testing to enable scalable assurance for communication system https://patents.google.com/?oq=18628625... have been identified in these networks. To perform safety-critical tasks at scale, swarms of autonomous aerial drones should be capable of rapidly reconfiguring and adapting in degraded conditions and reliably detecting and recovering from advers... |
| [v16242] | Probabilistic Perspectives on Error Minimization in Adversarial Reinforcement Learning https://doi.org/10.48550/arXiv.2406.04724Deep Reinforcement Learning (DRL) policies are highly susceptible to adversarial noise in observations, which poses significant risks in safety-critical scenarios. For instance, a self-driving car could experience catastrophic consequences if its sen... |
| [v16245] | AI-Based System and Method for Generating Enhanced Radiology Reports https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260128138).pnAccording to one embodiment, the report integration module is configured to integrate the AI-generated radiology report into a patient's electronic health record (EHR) using standards such as Health Level Seven (HL7), Fast Healthcare Interoperability... |
| [v16289] | Abstract: This article surveys the current state of artificial intelligence - what it can and cannot do today - across theory, technologies, representative applications, limitations, and governance. https://www.upuply.com/blog/what-can-ai-do-todayFor generative media, the trade-off between fidelity and controllability matters: higher fidelity generative models can create convincing audio and video, but controlling specifics (e.g., consistent character motion across scenes) remains difficult, ... |
| [v16323] | Adversarial Examples (AI)Adversarial TrainingAI EvaluationsDeceptive AlignmentMachine Learning (ML)AI https://www.lesswrong.com/posts/oPnFzfZtaoWrqTP4H/solving-adversarial-attacks-in-computer-vision-as-a-babyDespite my fundamental belief that machines can (eventually) do anything, the human brain seems to have some particularly great solutions to many challenging problems, especially where robustness extending to very rarified, long tails is needed (such... |
| [v16338] | Edge-Intelligent Block Chain Framework for Federated Privacy-Preserving Medical Diagnostics https://doi.org/10.1109/IC2NC67409.2025.11376420The framework also employs an energy-optimized consensus mechanism using adaptive Practical Byzantine Fault Tolerance (PBFT) to improve transaction throughput and scalability in edge environments. Experimental evaluation using the MIMIC-III and Physi... |
| [v16376] | FLARE: Adaptive Multi-Dimensional Reputation for Robust Client Reliability in Federated Learning https://doi.org/10.48550/arXiv.2511.14715The server performs the entire multi-dimensional reputation assessment Section III-B and dynamic thresholding III-C on these noisy updates.... |
| [v16401] | Dynamic Allostery of the Catabolite Activator Protein Revealed by Interatomic Forces https://pubmed.ncbi.nlm.nih.gov/26244893/For full activation and DNA binding, the homodimeric protein requires the binding of two cyclic AMP (cAMP) molecules in an anti-cooperative manner, the source of which appears to be largely of entropic nature according to previous experimental studie... |
| [v16416] | Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks https://doi.org/10.1109/DSN-W60302.2024.00024This is similar to universal adversarial perturbations (UAP). Indeed, UAPs are input-agnostic perturbations capable of misleading a well-trained model. We observe an intuitive phenomenon: UAPs generated from backdoored models need fewer perturbations... |
| [v16438] | Decision Transparency Enhancement And Integration Of User Feedback And Control Of Artificial Intelligence Outputs https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260127199).pnDecision Transparency Enhancement And Integration Of User Feedback And Control Of Artificial Intelligence Outputs --- The system of claim 1, wherein the natural language response comprises at least one explanation type selected from the group consist... |
| [v16446] | Prophet, Revisited: Practical Time-Series Forecasting at Scale https://joshuaberkowitz.us/blog/github-repos-8/prophet-revisited-practical-time-series-forecasting-at-scale-847Design choices emphasize interpretability and guardrails. Trend changepoints are regularized to prevent overfitting; seasonalities are represented with Fourier series; and holidays enter as binary regressors. The Python API mirrors scikit-learn's fi... |
| [v16468] | Exploration in Deep Reinforcement Learning: From Single-Agent to Multiagent Domain https://doi.org/10.1109/tnnls.2023.3236361The high entropy of TV becomes an irresistible attraction to the agent. In Fig. 4, we show a similar 'Noisy-TV' in VizDoom on the right. The uncontrollable Gaussian noise is added to the observation space, which attracts the agent to stay in the cur... |
| [v16482] | FASE : A Fairness-Aware Spatiotemporal Event Graph Framework for Predictive Policing https://arxiv.org/abs/2604.18644The absence of baselines means we cannot claim predictive superiority over simpler approaches. Fairness metric limitations.The DIR constraint measures patrol-intensity parity, not outcome parity.As demonstrated in Section 4.3, allocation-level DIR ≈... |
| [v16509] | Most multi-agent AI systems fail at coordination, not capability. https://particula.tech/blog/multi-agent-ai-orchestration-that-worksThe single biggest source of multi-agent system failures is unstructured communication. When agents pass free-form text to each other, small phrasing changes cause downstream misinterpretations that cascade through the system. Define Typed Message S... |
| [v16526] | Galaxy vs UFO ² vs Linux Agent vs Mobile Agent: When to Use What? https://microsoft.github.io/UFO/project_directory_structure/Event-Driven Coordination Safe Assignment Locking Agent Output Observer Using as Galaxy Device Speculative Multi-Action Windows Agent Arena Markdown Log Viewer Windows App Environment Creating Custom MCP Servers Creating Custom Third-Party A... |
| [v16531] | A Quantum-Resistant and AI-Resilient Real-Time Keystroke Protection Framework With Blockchain-Backed Decentralized Identity https://doi.org/10.1109/ACCESS.2026.3680275The system integrates Hyperledger Fabric for tamper-evident mapping management, W3C Decentralized Identifier (DID) support for self-sovereign identity, and optional zero-knowledge authentication to eliminate password transmission. Session keys are de... |
| [v16556] | Are Foundation Models All You Need for Zero-shot Face Presentation Attack Detection? http://www.visionbib.com/bibliography/update/2601.html... computationally efficient framework leveraging auxiliary head features for robust cloth-changing person re-identification, A Concentration Inequalities for Semidefinite Least Squares Based on Data Concept-Based Explanation for Deep Vision Model... |
| [v16569] | Bayesian Active Inference for Intelligent UAV Anti-Jamming and Adaptive Trajectory Planning https://doi.org/10.48550/arXiv.2512.05711This paper proposes a hierarchical trajectory planning framework for UAVs operating under adversarial jamming conditions. Leveraging Bayesian Active Inference, the approach combines expert-generated demonstrations with probabilistic generative modeli... |
| [v16615] | The Role of Blockchain in Zero Trust Architecture | HackerNoon https://hackernoon.com/the-role-of-blockchain-in-zero-trust-architectureThird, a blockchain-based log of network events offers a tamper-evident audit trail, elevating the concept of " verify everything " to an unassailable record of transactions and actions. Given that Zero Trust involves continuous monitoring, having an... |
| [v16647] | Prototype Learning for Explainable Brain Age Prediction https://doi.org/10.1109/WACV57701.2024.00772Explainable Brain Age Prediction: Several studies have attempted to introduce explainability into brain age prediction models, predominantly for adult MRI. Saliency methods have been used to explain brain age predictions [9,21,28,30,50], but their ex... |
| [v16658] | Trust-Aware AI-Enabled Edge Framework for Intelligent Traffic Control in Cyber-Physical Systems https://www.techscience.com/resultsAbstract The rapid evolution of smart cities has led to the deployment of Cyber-Physical IoT Systems (CPS-IoT) for real-time monitoring, intelligent decision-making, and efficient resource management, particularly in intelligent transportation and ve... |
| [v16662] | Dynamic Adversarial Fine-Tuning Reorganizes Refusal Geometry https://arxiv.org/abs/2604.27019Abstract: Safety-aligned language models must refuse harmful requests without collapsing into broad over-refusal, but the training-time mechanisms behind this tradeoff remain unclear. Prior work characterizes refusal directions and jailbreak robustne... |
| [v16678] | Zero-Shot Policy Transfer in Multi-Agent Reinforcement Learning via Trusted Federated Explainability https://doi.org/10.63282/3050-9246.ijetcsit-v6i3p118This paper proposes TFX-MARL (Trusted Federated Ex-plainability for MARL), a governance-inspired framework for zero-shot policy transfer across silos using trust metric-based federated learning (FL) and explainability controls. TFX-MARL contributes: ... |
| [v16699] | Synaptic Failure is a Flat Minima Optimizer https://www.semanticscholar.org/paper/73f11953bef1953f5d530df702a68bf403de34b7In addition to the effect on overfitting, we explore NormOut's impact on adversarial robustness against a suite of white and black-box attacks. Intriguingly, we find that some variants of NormOut produce extreme gradient masking without obfuscation. ... |
| [v16720] | On this day in tech history: In 1956, MIT researchers quietly tested the "Summer Vision Project precursor" camera rig, a hacked-together analog scanner used only in internal demos. https://aibreakfast.beehiiv.com/p/anthropic-to-go-publicThey handle multi-step reasoning, sub-task decomposition, and adapt to context dynamically. NotebookLM now supports prompts up to 10,000 characters, enabling detailed AI personas for work, education, and research. iOS features for infographics and s... |
| [v16772] | ONG: One-Shot NMF-based Gradient Masking for Efficient Model Sparsification https://arxiv.org/abs/2508.12891Abstract: Deep Neural Networks (DNNs) have achieved remarkable success but their large size poses deployment challenges. While various pruning techniques exist, many involve complex iterative processes, specialized criteria, or struggle to maintain s... |
| [v16776] | Bayesian Mediation Analysis with an Application to Explore Racial Disparities in the Diagnostic Age of Breast Cancer https://doi.org/10.3390/stats7020022Firstly, it allows us to make inferences on mediation effects based on the posterior distributions of parameters, eliminating the need for bootstrap sampling as we can directly obtain variances of estimates. Secondly, parameters are considered random... |
| [v16803] | Objective: The objective of the study is to build models for early prediction of risk for developing multiple organ dysfunction (MOD) in pediatric intensive care unit (PICU) patients. https://www.frontiersin.org/journals/pediatrics/articles/10.3389/fped.2021.711104/fullAll models were built in R (version 3.5.3) using the open source CRAN packages: xgboost (26), ranger (27), mboost (32), and glmnet (24), respectively, for the above methods. The choice of the above four methods was driven by the amount of available d... |
| [v16833] | Phase-Associative Memory: Sequence Modeling in Complex Hilbert Space https://arxiv.org/abs/2604.05030However, their adoption in domains that require guaranteed reliability has been hindered by persistent difficulties, most prominently hallucination and susceptibility to prompt injection , which have resisted solution despite substantial engineering... |
| [v16836] | ZeroGrad : Mitigating and Explaining Catastrophic Overfitting in FGSM Adversarial Training https://arxiv.org/abs/2103.15476Its goal is to evaluate robustness of models in a reliable manner and identify the defenses that give a wrong impression of robustness. Many earlier proposed defenses resulted in much lower robust accuracy compared to other common attacks that are us... |
| [v16866] | Austin is PI for new DoD Minerva Research... https://cee.umd.edu/news/story/austin-is-pi-for-new-dod-minerva-research-initiative-projectResults will represent a significant step toward interoperable, reconfigurable, and traceable system capabilities. "Our research will provide the ability to imagine and explore alternative institutional designs," Austin said. ""This includes organiz... |
| [v16891] | Decision Transparency Enhancement And Integration Of User Feedback And Control Of Artificial Intelligence Outputs https://ppubs.uspto.gov/pubwebapp/external.html?q=(20260127199).pnThe disclosed subject matter, in some embodiments thereof, relates to artificial intelligence explainability and customization and, more specifically, but not exclusively, to decision transparency enhancement and integration of user feedback and cont... |
| [v16904] | 2025: As organizations deploy millions of smart devices, the challenge of managing identity, access, and secure connectivity becomes mission-critical. https://shreyaswebmediasolutions.com/technology/securing-the-edge-how-idaas-supercharges-identity-management-in-aws-iot-core/A Zero Trust model assumes no implicit trust - every device, user, or app must continuously prove its identity. When combined with AWS IoT Core, IDaaS enables this model by: Context-aware access (e.g., deny connections from unknown IPs or geo-zones)... |
| [v16996] | Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks https://www.mdpi.com/2227-7390/13/15/2471Both variants successfully reduced the number of communication rounds by almost 50% compared to traditional FedAvg, thereby confirming communication efficiency. However, the attention mechanisms need a lot of computing power, using function call grap... |
| [v17005] | The Geometric Canary: Predicting Steerability and Detecting Drift via Representational Stability https://arxiv.org/abs/2604.17698Representation Engineering (Zou et al., 2023) and causal interventions (Meng et al., 2022;Geiger et al., 2024) rely on the Linear Representation Hypothesis (Park et al., 2023(Park et al., , 2025)), which posits that concepts are encoded as stable lin... |
| [v17029] | Anthropomorphism-based causal and responsibility attributions to robots https://doi.org/10.1038/s41598-023-39435-5It is not always clear whether a human or robot was the cause of a failure in interactive situations. Nevertheless, a person will sometimes infer a cause and attribute responsibility to somebody or something for the failure, as is the case in the hum... |