惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

U
Unit 42
V
V2EX
Martin Fowler
Martin Fowler
博客园 - Franky
P
Proofpoint News Feed
P
Palo Alto Networks Blog
H
Hackread – Cybersecurity News, Data Breaches, AI and More
B
Blog
The Register - Security
The Register - Security
Latest news
Latest news
S
Security @ Cisco Blogs
Simon Willison's Weblog
Simon Willison's Weblog
Recorded Future
Recorded Future
大猫的无限游戏
大猫的无限游戏
M
Microsoft Research Blog - Microsoft Research
Scott Helme
Scott Helme
T
Tailwind CSS Blog
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
Application and Cybersecurity Blog
Application and Cybersecurity Blog
T
True Tiger Recordings
有赞技术团队
有赞技术团队
I
Intezer
Cisco Talos Blog
Cisco Talos Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
The GitHub Blog
The GitHub Blog
cs.AI updates on arXiv.org
cs.AI updates on arXiv.org
T
Tenable Blog
博客园 - 叶小钗
Hugging Face - Blog
Hugging Face - Blog
Hacker News: Ask HN
Hacker News: Ask HN
S
Security Archives - TechRepublic
F
Future of Privacy Forum
爱范儿
爱范儿
PCI Perspectives
PCI Perspectives
H
Help Net Security
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
T
The Blog of Author Tim Ferriss
MyScale Blog
MyScale Blog
N
Netflix TechBlog - Medium
罗磊的独立博客
Apple Machine Learning Research
Apple Machine Learning Research
MongoDB | Blog
MongoDB | Blog
Security Latest
Security Latest
美团技术团队
博客园 - 三生石上(FineUI控件)
S
Schneier on Security
量子位
C
CERT Recently Published Vulnerability Notes
SecWiki News
SecWiki News

cs.AI updates on arXiv.org

Skill Weaving: Efficient LLM Improvement via Modular Skillpacks Forecasting Scientific Progress with Artificial Intelligence Frequency-Domain Regularized Adversarial Alignment for Transferable Attacks against Closed-Source MLLMs Measuring Cross-Modal Synergy: A Benchmark for VLM Explainability What Counts as AI Sycophancy? A Taxonomy and Expert Survey of a Fragmented Construct TO-Agents: A Multi-Agent AI Pipeline for Preference-Guided Topology Optimization High-speed Networking for Giga-Scale AI Factories A Subjective Logic-based method for runtime confidence updates in safety arguments Faster Completion, Less Learning: Generative AI Reduced Study Time on Math Problems and the Knowledge They Build Meta-Soft: Leveraging Composable Meta-Tokens for Context-Preserving KV Cache Compression RefusalBench: Why Refusal Rate Misranks Frontier LLMs on Biological Research Prompts IdleSpec: Exploiting Idle Time via Speculative Planning for LLM Agents The Log is the Agent: Event-Sourced Reactive Graphs for Auditable, Forkable Agentic Systems LLM-Metrics: Measuring Research Impact Through Large Language Model Memory Evaluation of Pipelines for Data Integration into Knowledge Graphs Cross-domain benchmarks reveal when coordinated AI agents improve scientific inference from partial evidence Planning, Scheduling, and Behavior in EV Charging Systems: A Critical Survey and Trilemma Framework Claw AI Lab: An Autonomous Multi-Agent Research Team Adapting the Interface, Not the Model: Runtime Harness Adaptation for Deterministic LLM Agents Memory-Induced Supra-Competitive Outcomes Between Deep Reinforcement Learning Agents in Optimal Trade Execution Advancing Mathematics Research with AI-Driven Formal Proof Search Trace2Skill: Verifier-Guided Skill Evolution for Long-Context EDA Agents ECPO: Evidence-Coupled Policy Optimization for Evidence-Certified Candidate Ranking Towards a compositional semantics for quantitative confidence assessment in assurance arguments Unlocking Proactivity in Task-Oriented Dialogue A Causal Argumentation Method for Explainability of Machine Learning Models MindLoom: Composing Thought Modes for Frontier-Level Reasoning Data Synthesis ExComm: Exploration-Stage Communication for Error-Resilient Agentic Test-Time Scaling Towards Direct Evaluation of Harness Optimizers via Priority Ranking CLORE: Content-Level Optimization for Reasoning Efficiency Scalable On-Policy Reinforcement Learning via Adaptive Batch Scaling Can AI Make Conflicts Worse? An Alignment Failure in LLM Deployment Across Conflict Contexts Towards a General Intelligence and Interface for Wearable Health Data Meta-Learning for Rapid Adaptation in Reference Tracking of Uncertain Nonlinear Systems WorkstreamBench: Evaluating LLM Agents on End-to-End Spreadsheet Tasks in Finance HarnessAPI: A Skill-First Framework for Unified Streaming APIs and MCP Tools Learning Altruistic Collaboration in Heterogeneous Multi-Team Systems Gated DeltaNet-2: Decoupling Erase and Write in Linear Attention A Camera-Cooperative ISAC Framework for Multimodal Non-Cooperative UAVs Sensing Investigating Concept Alignment Using Implausible Category Members Spreadsheet-RL: Advancing Large Language Model Agents on Realistic Spreadsheet Tasks via Reinforcement Learning Latent-space Attacks for Refusal Evasion in Language Models Graph neural network explanations reveal a topological signature of disease-associated hubs in biological networks Evaluating Large Language Models as Live Strategic Agents: Provider Performance, Hybrid Decomposition, and Operational Gaps in Timed Risk Play MPDocBench-Parse: Benchmarking Practical Multi-page Document Parsing Protein Thoughts: Interpretable Reasoning with Tree of Thoughts and Embedding-Space Flow Matching for Protein-Protein Interaction Discovery Local Covariate Selection for Average Causal Effect Estimation without Pretreatment and Causal Sufficiency Assumptions AI-Enabled Serious Games: Integrating Intelligence and Adaptivity in Training Systems TBP-mHC: full expressivity for manifold-constrained hyper connections through transportation polytopes SMDD-Bench: Can LLMs Solve Real-World Small Molecule Drug Design Tasks? Toward AI VIS Co-Scientists: A General and End-to-End Agent Harness for Solving Complex Data Visualization Tasks AttuneBench: A Conversation-Based Benchmark for LLM Emotional Intelligence Format-Constraint Coupling in Knowledge Graph Construction from Statistical Tables Active Evidence-Seeking and Diagnostic Reasoning in Large Language Models for Clinical Decision Support Implicit Safety Alignment from Crowd Preferences SGR-Bench: Benchmarking Search Agents on State-Gated Retrieval Visibility nowcasting in South Korea: a machine learning approach to class imbalance and distribution shift SciCore-Mol: Augmenting Large Language Models with Pluggable Molecular Cognition Modules Autonomous LLM Agents & CTFs: A Second Look Harnesses for Inference-Time Alignment over Execution Trajectories AtelierEval: Agentic Evaluation of Humans & LLMs as Text-to-Image Prompters Compiling Agentic Workflows into LLM Weights: Near-Frontier Quality at Two Orders of Magnitude Less Cost Beyond the Org Chart: AI and the Transformation of Invisible Work When Are Teacher Tokens Reliable? Position-Weighted On-Policy Self-Distillation for Reasoning S2ED: From Story to Executable Descriptions for Consistency-Aware Story Illustration KAPPS: A knowledge-based CPPS Architecture for the Circular Factory TerminalWorld: Benchmarking Agents on Real-World Terminal Tasks MOSS: Self-Evolution through Source-Level Rewriting in Autonomous Agent Systems Deep Reinforcement Learning for Flexible Job Shop Scheduling with Random Job Arrivals Is Capability a Liability? More Capable Language Models Make Worse Forecasts When It Matters Most Parametric Modular Answer Set Programs Made Declarative Benchmarking and Improving Monitors for Out-Of-Distribution Alignment Failure in LLMs The Impact of AI Usage and Informativeness on Skill Development in Logical Reasoning AOP-Wiki EMOD 3.0: Data Model Expansions and Content Evaluation Framework for Using Agentic AI to Improve Integration between AOPs and New Approach Methodologies (NAMs) FLUID: From Ephemeral IDs to Multimodal Semantic Codes for Industrial-Scale Livestreaming Recommendation The Shape of Testimony: A Scalable Framework for Oral History Archive Comparison ArborKV: Structure-Aware KV Cache Management for Scaling Tree-based LLM Reasoning Addressing the Synergy Gap: The Six Elements of the Design Space Predicting Performance of Symbolic and Prompt Programs with Examples A Reproducible Log-Driven AutoML Framework for Interpretable Pipeline Optimization in Healthcare Risk Prediction Multivariate Financial Forecasting using the Chronos Time Series Foundation Models Knowledge Graph Re-engineering Along the Ontological Continuum (extended version) The Attribution Impossibility: No Feature Ranking Is Faithful, Stable, and Complete Under Collinearity Who Uses AI? Platforms, Workforce, and AI Exposure LCGuard: Latent Communication Guard for Safe KV Sharing in Multi-Agent Systems Scaling Observation-aware Planning in Uncertain Domains Think Thrice Before You Speak: Dual knowledge-enhanced Theory-of-Mind Reasoning for Persuasive Agents Perception or Prejudice: Can MLLMs Go Beyond First Impressions of Personality? Enhancing Visual Token Representations for Video Large Language Models via Training-Free Spatial-Temporal Pooling and Gridding ST-SimDiff: Balancing Spatiotemporal Similarity and Difference for Efficient Video Understanding with MLLMs Planning in the LLM Era: Building for Reliability and Efficiency Tackle CSM in JPEG Steganalysis with Data Adaptation Hierarchical Variational Policies for Reward-Guided Diffusion Beyond Acoustic Emotion Recognition: Multimodal Pathos Analysis in Political Speech Using LLM-Based and Acoustic Emotion Models Look-Closer-Then-Diagnose: Confidence-Aware Ultrasound VQA via Active Zooming MRecover: A Conditional Generative Model for Recovering Motion-Corrupted MR images Using AI Generated Contrast Ratchet: A Minimal Hygiene Recipe for Self-Evolving LLM Agents Efficient Agentic Reasoning Through Self-Regulated Simulative Planning Epicure: Navigating the Emergent Geometry of Food Ingredient Embeddings Don't Collapse Your Features: Why CenterLoss Hurts OOD Detection and Multi-Scale Mahalanobis Wins
PocketAgents: A Manifest-Driven Library of Autonomous Defense Agents
Sidnei Barbi · 2026-05-23 · via cs.AI updates on arXiv.org

View PDF HTML (experimental)

Abstract:Connecting large language models (LLMs) to defensive enforcement requires more than asking a model whether an attack is happening. A defender must decide which model outputs may change the system state, which outputs must be rejected, and how failures should be recorded. We present PocketAgents, a manifest-driven library of autonomous defense agents. Each agent is installed as three data files: a manifest, a prompt, and a runtime context. The shared runtime gives the agent bounded telemetry access and accepts only typed reports whose requested action appears in the manifest. We implemented PocketAgents on top of a cyber arena (Perry), a cyber-deception testbed, and evaluated two agents, Command and Control and Exfiltration, in 18 closed-loop trials of a DarkSide-inspired attack on a small enterprise topology. Thirteen trials produced validated network-block actions and contained the attack; four failed schema validation; one produced a valid no-action decision. The experiments show that a typed boundary makes LLM-driven defense measurable, extensible, and attributable.
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
Cite as: arXiv:2605.21694 [cs.CR]
  (or arXiv:2605.21694v1 [cs.CR] for this version)
  https://doi.org/10.48550/arXiv.2605.21694

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Ágney Lopes Roth Ferraz [view email]
[v1] Wed, 20 May 2026 19:52:24 UTC (73 KB)