惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

U
Unit 42
V
V2EX
Martin Fowler
Martin Fowler
博客园 - Franky
P
Proofpoint News Feed
P
Palo Alto Networks Blog
H
Hackread – Cybersecurity News, Data Breaches, AI and More
B
Blog
The Register - Security
The Register - Security
Latest news
Latest news
S
Security @ Cisco Blogs
Simon Willison's Weblog
Simon Willison's Weblog
Recorded Future
Recorded Future
大猫的无限游戏
大猫的无限游戏
M
Microsoft Research Blog - Microsoft Research
Scott Helme
Scott Helme
T
Tailwind CSS Blog
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
Application and Cybersecurity Blog
Application and Cybersecurity Blog
T
True Tiger Recordings
有赞技术团队
有赞技术团队
I
Intezer
Cisco Talos Blog
Cisco Talos Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
The GitHub Blog
The GitHub Blog
cs.AI updates on arXiv.org
cs.AI updates on arXiv.org
T
Tenable Blog
博客园 - 叶小钗
Hugging Face - Blog
Hugging Face - Blog
Hacker News: Ask HN
Hacker News: Ask HN
S
Security Archives - TechRepublic
F
Future of Privacy Forum
爱范儿
爱范儿
PCI Perspectives
PCI Perspectives
H
Help Net Security
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
T
The Blog of Author Tim Ferriss
MyScale Blog
MyScale Blog
N
Netflix TechBlog - Medium
罗磊的独立博客
Apple Machine Learning Research
Apple Machine Learning Research
MongoDB | Blog
MongoDB | Blog
Security Latest
Security Latest
美团技术团队
博客园 - 三生石上(FineUI控件)
S
Schneier on Security
量子位
C
CERT Recently Published Vulnerability Notes
SecWiki News
SecWiki News

cs.AI updates on arXiv.org

The Illusion of Reasoning: Exposing Evasive Data Contamination in LLMs via Zero-CoT Truncation A Causal Argumentation Method for Explainability of Machine Learning Models Evaluating Large Language Models as Live Strategic Agents: Provider Performance, Hybrid Decomposition, and Operational Gaps in Timed Risk Play Patch Hierarchical Attention Transformer for Efficient Particle Jet Tagging Memory-Induced Supra-Competitive Outcomes Between Deep Reinforcement Learning Agents in Optimal Trade Execution LCGuard: Latent Communication Guard for Safe KV Sharing in Multi-Agent Systems HarnessAPI: A Skill-First Framework for Unified Streaming APIs and MCP Tools Knowledge Graph Re-engineering Along the Ontological Continuum (extended version) MindLoom: Composing Thought Modes for Frontier-Level Reasoning Data Synthesis Meta-Soft: Leveraging Composable Meta-Tokens for Context-Preserving KV Cache Compression Engineering Hybrid Physics-Informed Neural Networks for Next-Generation Electricity Systems: A State-of-the-Art Review Unlocking Proactivity in Task-Oriented Dialogue When Are Teacher Tokens Reliable? Position-Weighted On-Policy Self-Distillation for Reasoning MOSS: Self-Evolution through Source-Level Rewriting in Autonomous Agent Systems PEARL: Unbiased Percentile Estimation via Contrastive Learning for Industrial-Scale Livestream Recommendation Spreadsheet-RL: Advancing Large Language Model Agents on Realistic Spreadsheet Tasks via Reinforcement Learning Thermodynamic Irreversibility of Training Algorithms CausalGuard: Conformal Inference under Graph Uncertainty S2ED: From Story to Executable Descriptions for Consistency-Aware Story Illustration AttuneBench: A Conversation-Based Benchmark for LLM Emotional Intelligence Towards a General Intelligence and Interface for Wearable Health Data Understanding Perspectives of Patients, Caregivers and Clinicians towards Emerging Collaborative-decision Making Technologies A Camera-Cooperative ISAC Framework for Multimodal Non-Cooperative UAVs Sensing AI-Enabled Serious Games: Integrating Intelligence and Adaptivity in Training Systems Protein Thoughts: Interpretable Reasoning with Tree of Thoughts and Embedding-Space Flow Matching for Protein-Protein Interaction Discovery Predicting Performance of Symbolic and Prompt Programs with Examples OPPO: Bayesian Value Recursion for Token-Level Credit Assignment in LLM Reasoning Gated DeltaNet-2: Decoupling Erase and Write in Linear Attention Towards Direct Evaluation of Harness Optimizers via Priority Ranking Graph neural network explanations reveal a topological signature of disease-associated hubs in biological networks Parametric Modular Answer Set Programs Made Declarative TBP-mHC: full expressivity for manifold-constrained hyper connections through transportation polytopes TO-Agents: A Multi-Agent AI Pipeline for Preference-Guided Topology Optimization EvoScene-VLA: Evolving Scene Beliefs Inside the Action Decoder for Chunked Robot Control Cross-domain benchmarks reveal when coordinated AI agents improve scientific inference from partial evidence Implicit Safety Alignment from Crowd Preferences FLUID: From Ephemeral IDs to Multimodal Semantic Codes for Industrial-Scale Livestreaming Recommendation The Shape of Testimony: A Scalable Framework for Oral History Archive Comparison SMDD-Bench: Can LLMs Solve Real-World Small Molecule Drug Design Tasks? Beyond the Org Chart: AI and the Transformation of Invisible Work Is Capability a Liability? More Capable Language Models Make Worse Forecasts When It Matters Most Toward AI VIS Co-Scientists: A General and End-to-End Agent Harness for Solving Complex Data Visualization Tasks Claw AI Lab: An Autonomous Multi-Agent Research Team KAPPS: A knowledge-based CPPS Architecture for the Circular Factory The Log is the Agent: Event-Sourced Reactive Graphs for Auditable, Forkable Agentic Systems Planning, Scheduling, and Behavior in EV Charging Systems: A Critical Survey and Trilemma Framework Towards a compositional semantics for quantitative confidence assessment in assurance arguments The Impact of AI Usage and Informativeness on Skill Development in Logical Reasoning Autonomous LLM Agents & CTFs: A Second Look ArborKV: Structure-Aware KV Cache Management for Scaling Tree-based LLM Reasoning Scalable On-Policy Reinforcement Learning via Adaptive Batch Scaling Learning Altruistic Collaboration in Heterogeneous Multi-Team Systems Skill Weaving: Efficient LLM Improvement via Modular Skillpacks SciCore-Mol: Augmenting Large Language Models with Pluggable Molecular Cognition Modules Local Covariate Selection for Average Causal Effect Estimation without Pretreatment and Causal Sufficiency Assumptions Compiling Agentic Workflows into LLM Weights: Near-Frontier Quality at Two Orders of Magnitude Less Cost Multivariate Financial Forecasting using the Chronos Time Series Foundation Models Harnesses for Inference-Time Alignment over Execution Trajectories High-speed Networking for Giga-Scale AI Factories WorkstreamBench: Evaluating LLM Agents on End-to-End Spreadsheet Tasks in Finance Frequency-Domain Regularized Adversarial Alignment for Transferable Attacks against Closed-Source MLLMs Addressing the Synergy Gap: The Six Elements of the Design Space A Reproducible Log-Driven AutoML Framework for Interpretable Pipeline Optimization in Healthcare Risk Prediction Support-aware offline policy selection for advertising marketplaces Adapting the Interface, Not the Model: Runtime Harness Adaptation for Deterministic LLM Agents CLORE: Content-Level Optimization for Reasoning Efficiency ExComm: Exploration-Stage Communication for Error-Resilient Agentic Test-Time Scaling LLM-Metrics: Measuring Research Impact Through Large Language Model Memory Latent-space Attacks for Refusal Evasion in Language Models Benchmarking and Improving Monitors for Out-Of-Distribution Alignment Failure in LLMs What Counts as AI Sycophancy? A Taxonomy and Expert Survey of a Fragmented Construct Evaluation of Pipelines for Data Integration into Knowledge Graphs Dynamic Hypergraph Representation Learning for Multivariate Time Series without Prior Knowledge ChronoMedicalWorld: A Medical World Model for Learning Patient Trajectories from Longitudinal Care Data AOP-Wiki EMOD 3.0: Data Model Expansions and Content Evaluation Framework for Using Agentic AI to Improve Integration between AOPs and New Approach Methodologies (NAMs) Active Evidence-Seeking and Diagnostic Reasoning in Large Language Models for Clinical Decision Support AtelierEval: Agentic Evaluation of Humans & LLMs as Text-to-Image Prompters Format-Constraint Coupling in Knowledge Graph Construction from Statistical Tables TerminalWorld: Benchmarking Agents on Real-World Terminal Tasks A Subjective Logic-based method for runtime confidence updates in safety arguments Who Uses AI? Platforms, Workforce, and AI Exposure Meta-Learning for Rapid Adaptation in Reference Tracking of Uncertain Nonlinear Systems Trace2Skill: Verifier-Guided Skill Evolution for Long-Context EDA Agents Deep Reinforcement Learning for Flexible Job Shop Scheduling with Random Job Arrivals Forecasting Scientific Progress with Artificial Intelligence The Attribution Impossibility: No Feature Ranking Is Faithful, Stable, and Complete Under Collinearity Think Thrice Before You Speak: Dual knowledge-enhanced Theory-of-Mind Reasoning for Persuasive Agents Can AI Make Conflicts Worse? An Alignment Failure in LLM Deployment Across Conflict Contexts RefusalBench: Why Refusal Rate Misranks Frontier LLMs on Biological Research Prompts Advancing Mathematics Research with AI-Driven Formal Proof Search PocketAgents: A Manifest-Driven Library of Autonomous Defense Agents Scaling Observation-aware Planning in Uncertain Domains Measuring Cross-Modal Synergy: A Benchmark for VLM Explainability SGR-Bench: Benchmarking Search Agents on State-Gated Retrieval IdleSpec: Exploiting Idle Time via Speculative Planning for LLM Agents Faster Completion, Less Learning: Generative AI Reduced Study Time on Math Problems and the Knowledge They Build MPDocBench-Parse: Benchmarking Practical Multi-page Document Parsing Visibility nowcasting in South Korea: a machine learning approach to class imbalance and distribution shift ECPO: Evidence-Coupled Policy Optimization for Evidence-Certified Candidate Ranking LLM Retrieval for Stable and Predictable Ad Recommendations
Measuring Security Without Fooling Ourselves: Why Benchmarking Agents Is Hard
Sahar Abdeln · 2026-05-23 · via cs.AI updates on arXiv.org

View PDF HTML (experimental)

Abstract:The benchmarks used to evaluate AI agents in security-critical roles suffer from crucial weaknesses. Building on recent empirical evidence, we characterize three core challenges that undermine security evaluations: benchmark vulnerabilities, temporal staleness, and runtime uncertainty. We then outline practical directions toward building more robust and trustworthy evaluation frameworks.
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
Cite as: arXiv:2605.22568 [cs.CR]
  (or arXiv:2605.22568v1 [cs.CR] for this version)
  https://doi.org/10.48550/arXiv.2605.22568

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Konrad Rieck [view email]
[v1] Thu, 21 May 2026 14:47:54 UTC (11 KB)