#academicpapers — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #academicpapers, aggregated by home.social.
-
LLMs and Text-in-Text Steganography
Turns out that LLMs are really good at hiding text messages in other text messages.... https://www.schneier.com/blog/archives/2026/05/llms-and-text-in-text-steganography.html
-
Rowhammer Attack Against NVIDIA Chips
A new rowhammer attack gives complete control of NVIDIA CPUs... https://www.schneier.com/blog/archives/2026/05/rowhammer-attack-against-nvidia-chips.html
#academicpapers #Uncategorized #cyberattack #hardware #hacking
-
Human Trust of AI Agents
Interesting research: “Humans expect rationality and cooperation from LLM opponents in strategic games.”
Abstract: As Large Language Models (LLMs) integrate into ... https://www.schneier.com/blog/archives/2026/04/human-trust-of-ai-agents.html -
How Hackers Are Thinking About AI
Interesting paper: “What hackers talk about when they talk about AI: Early-stage diffusion of a cybercrime innovation.”
Abstract: The rapid expansion of artificia... https://www.schneier.com/blog/archives/2026/04/how-hackers-are-thinking-about-ai.html -
AI Chatbots and Trust
All the leading AI chatbots are sycophantic, and that’s a problem:
Participants rated sycophantic... https://www.schneier.com/blog/archives/2026/04/ai-chatbots-and-trust.html -
🚂💪 #MegaTrain claims to squeeze a 100B+ parameter elephant into a single GPU's tutu, like cramming a sumo wrestler into a phone booth, all while expecting us to applaud this feat of mathematical contortion. 😆🙄 Meanwhile, #arXiv is busy patting itself on the back, crowning itself the nonprofit #superhero of academic papers. 🦸♂️📚
https://arxiv.org/abs/2604.05091 #GPU #AI #AcademicPapers #HackerNews #ngated -
New Attack Against Wi-Fi
It’s called AirSnitch:
Unlike previous Wi-Fi attacks, AirSnitch exploits core features i... https://www.schneier.com/blog/archives/2026/03/new-attack-against-wi-fi.html#man-in-the-middleattacks #academicpapers #Uncategorized #cyberattack #Wi-Fi
-
UC San Francisco: Announcing the Open Access UC-Authored Monographs Pilot Project. “The University of California (UC) Libraries are supporting several open access pilot projects intended to broaden access to UC research and scholarship by making UC-authored books freely available online.”
https://rbfirehose.com/2026/03/02/uc-san-francisco-announcing-the-open-access-uc-authored-monographs-pilot-project/ -
Side-Channel Attacks Against LLMs
Here are three papers describing different side-channel attacks against LLMs.
“Remote Timing Attacks on Efficient Language Model Inference“:
Abstract: S... https://www.schneier.com/blog/archives/2026/02/side-channel-attacks-against-llms.html#side-channelattacks #academicpapers #Uncategorized #LLM
-
Prompt Injection Via Road Signs
Interesting research: “CHAI: Command Hijacking Against Embodied AI.”
Abstract: Embodied Artificial Intelligence (AI) promises to handle edge cases in robotic vehi... https://www.schneier.com/blog/archives/2026/02/prompt-injection-via-road-signs.html -
UC Berkeley: How AI is transforming research: More papers, less quality, and a strained review system. “Even as AI tools help researchers write more papers faster, many of these studies are of marginal scientific merit. The resulting flood of polished but potentially superficial work is making it harder for reviewers, funders, and policymakers to separate worthy papers from unimportant and […]
https://rbfirehose.com/2026/01/29/uc-berkeley-how-ai-is-transforming-research-more-papers-less-quality-and-a-strained-review-system/ -
The Register: AI conference’s papers contaminated by AI hallucinations. “[GPTZero] has identified 100 hallucinations in more than 51 papers accepted by the Conference on Neural Information Processing Systems (NeurIPS). This finding follows the company’s prior discovery of 50 hallucinated citations in papers under review by the International Conference on Learning Representations (ICLR).”
https://rbfirehose.com/2026/01/26/the-register-ai-conferences-papers-contaminated-by-ai-hallucinations/ -
Corrupting LLMs Through Weird Generalizations
Fascinating research:
Weird Generalization and Inductive Backdoors: New Ways to Corrupt LLMs.
AbstractLLMs are useful because they generalize so well. But can you have... https://www.schneier.com/blog/archives/2026/01/corrupting-llms-through-weird-generalizations.html -
Friday Squid Blogging: Squid Camouflage
New research:
Abstract: Coleoid cephalopods have the most elaborate camouflage system in the animal kingdom. This enables them to hide from or deceive both ... https://www.schneier.com/blog/archives/2025/12/friday-squid-blogging-squid-camouflage.html -
AIs Exploiting Smart Contracts
I have long maintained that smart contracts are a dumb idea: that a human process is actually a security feature.
Here’s some interesting research on training AIs to automa... https://www.schneier.com/blog/archives/2025/12/ais-exploiting-smart-contracts.html -
AI vs. Human Drivers
Two competing arguments are making the rounds. The first is by a neurosurgeon in the New York Times. In an op-ed that honestly sounds like it was paid for by Waymo, the author calls driverless cars a &... https://www.schneier.com/blog/archives/2025/12/ai-vs-human-drivers.html
-
🥳🎩🎓 Oh look, Terence Tao discovers the magical world of math on steroids – now with 200% more buzzwords and 0% practical relevance! 🤖📚🤡 Forget solving real-world problems; let's just talk about them in endless papers! 🚀🔍
https://terrytao.wordpress.com/2025/11/05/mathematical-exploration-and-discovery-at-scale/ #TerenceTao #MathBuzzwords #AcademicPapers #PracticalRelevance #MathematicsHumor #HackerNews #ngated -
#Perplexity launched a new #AIpowered #patentresearch tool that allows users to search for #patents using natural language. The tool extends beyond exact keyword matches and can also search through #academicpapers and other sources for prior art. https://www.theverge.com/news/811340/perplexity-ai-patent-research-tool?eicker.news #tech #media #news
-
A Surprising Amount of Satellite Traffic Is Unencrypted
Here’s the summary:
We pointed a commercial-off-the-shelf satellite dish at the sky and carried out the most comprehensive public study to date of geostationary satellite commu... https://www.schneier.com/blog/archives/2025/10/a-surprising-amount-of-satellite-traffic-is-unencrypted.html#academicpapers #dataprotection #infrastructure #Uncategorized #eavesdropping
-
A Surprising Amount of Satellite Traffic Is Unencrypted https://www.schneier.com/blog/archives/2025/10/a-surprising-amount-of-satellite-traffic-is-unencrypted.html #academicpapers #dataprotection #infrastructure #Uncategorized #eavesdropping #cellphones #encryption
-
Oh joy, another convoluted academic paper that pretends to transform the world by wrestling with metaphorical slot machines. 🎰🤖 Who knew that teaching computers to gamble could be so riveting? Thanks, Simons Foundation, for #funding this thrill ride! 🎢💰
https://arxiv.org/abs/1904.07272 #academicpapers #technology #gambling #research #excitement #HackerNews #ngated -
🎉Who needs complex algorithms when 1️⃣ bit can solve the world's problems? Eduardo Lobo Lustoda hopes you'll believe less is more in his binary fairytale, while the Simons Foundation stands by like proud parents at a talent show. 🤡 Just another day in the mystical land of overhyped academic papers. 📚✨
https://arxiv.org/abs/2509.07025 #binaryfairytale #lessismore #academicpapers #SimonsFoundation #techinnovation #problem-solving #HackerNews #ngated -
Ars Technica: Science journalists find ChatGPT is bad at summarizing scientific papers. “On the question of whether the ChatGPT summaries “could feasibly blend into the rest of your summary lineups, the average summary rated a score of just 2.26 on a scale of 1 (‘no, not at all’) to 5 (‘absolutely’). On the question of whether the summaries were “compelling,” the LLM summaries averaged just […]
-
Time-of-Check Time-of-Use Attacks Against LLMs https://www.schneier.com/blog/archives/2025/09/time-of-check-time-of-use-attacks-against-llms.html #vulnerabilities #academicpapers #Uncategorized #cyberattack #LLM
-
Time-of-Check Time-of-Use Attacks Against LLMs
This is a nice piece of research: “Mind the Gap: Time-of-Check to Time-of-Use Vulnerabilities in LLM-Enabled Agents“.:
Abstract: Large Language Model (LLM)-enable... https://www.schneier.com/blog/archives/2025/09/time-of-check-time-of-use-attacks-against-llms.html#vulnerabilities #academicpapers #Uncategorized #cyberattack #LLM
-
🤡 "Hello, is this Anna?" No, it's yet another mind-numbing academic paper 🍖 on #scams that everyone with a brain already understands without a PhD in #PigButchering. 🐷 Grateful to the Simons Foundation for funding this "groundbreaking" revelation. 🙄
https://arxiv.org/abs/2503.20821 #academicpapers #SimonsFoundation #researchhumor #HackerNews #ngated -
Assessing the Quality of Dried Squid
Research:
Nondestructive detection of multiple dried squid qualities by hyperspectral imaging combined with 1D-KAN-CNN
Abstract:... https://www.schneier.com/blog/archives/2025/09/assessing-the-quality-of-dried-squid.html -
New Cryptanalysis of the Fiat-Shamir Protocol https://www.schneier.com/blog/archives/2025/09/new-cryptanalysis-of-the-fiat-shamir-protocol.html #academicpapers #Uncategorized #cryptanalysis #protocols #hashes
-
New Cryptanalysis of the Fiat-Shamir Protocol
A couple of months ago, a new paper demonstrated some new attacks against the Fiat-Shamir transformation. Quanta published a <a href="https://www.quantamagazine.org/computer-scientists-figure-o... https://www.schneier.com/blog/archives/2025/09/new-cryptanalysis-of-the-fiat-shamir-protocol.html
#academicpapers #Uncategorized #cryptanalysis #protocols #hashes
-
Indirect Prompt Injection Attacks Against LLM Assistants
Really good research on practical attacks against LLM agents.
“Invitation Is All You Need! Promptware A... https://www.schneier.com/blog/archives/2025/09/indirect-prompt-injection-attacks-against-llm-assistants.html#academicpapers #Uncategorized #threatmodels #cyberattack #LLM #AI
-
Indirect Prompt Injection Attacks Against LLM Assistants https://www.schneier.com/blog/archives/2025/09/indirect-prompt-injection-attacks-against-llm-assistants.html #academicpapers #Uncategorized #threatmodels #cyberattack #LLM #AI
-
🤡 Oh, look! It's yet another #verbose academic paper trying to decide if we should root for the rebel or the dictator. Spoiler: they never actually answer the question. Meanwhile, they pat themselves on the back for having a "mission" and "values" 🚀.
https://www.frontiersin.org/articles/10.3389/fpos.2025.1605460 #academicpapers #discourse #rebelvsdictator #critique #values #mission #HackerNews #ngated -
Gizmodo: Million-Dollar Project Aims to Expose Bad Medical Research. “The Center for Scientific Integrity just launched the Medical Evidence Project, a two-year effort to identify published medical research with a negative effect on health guidelines—and to make sure people actually hear about it. Equipped with a $900,000 grant from Open Philanthropy and a core team of up to five […]
-
Iowa University Libraries: Big Ten Academic Alliance and Springer Nature announce first-ever unlimited Open Access Publishing Agreement in the Americas . “The Big Ten Academic Alliance has signed a two-year Open Publishing Agreement with Springer Nature… This is the Big Ten Academic Alliance’s fifth Open Publishing Agreement or OPA, and its most expansive to date. This groundbreaking deal […]
-
TechXplore: ‘Reborn articles’: Simple approach enables direct publication of machine-readable scientific findings. “Rather than trying to teach machines our language, why not produce science in a language they already understand? In an article published in Scientific Data, the team introduces reborn articles, an open-source approach that allows researchers to produce scientific findings in a […]
-
Regulating AI Behavior with a Hypervisor – Source: www.schneier.com https://ciso2ciso.com/regulating-ai-behavior-with-a-hypervisor-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.”
Abstract:As AI models become more embedded in critical sectors like finance, healthca... https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html#physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Regulating AI Behavior with a Hypervisor https://www.schneier.com/blog/archives/2025/04/regulating-ai-behavior-with-a-hypervisor.html #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Improvements in Brute Force Attacks – Source: www.schneier.com https://ciso2ciso.com/improvements-in-brute-force-attacks-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #academicpapers #cryptanalysis #Uncategorized #keys
-
Improvements in Brute Force Attacks
New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.”
... https://www.schneier.com/blog/archives/2025/03/improvements-in-brute-force-attacks.html -
Implementing Cryptography in AI Systems – Source: www.schneier.com https://ciso2ciso.com/implementing-cryptography-in-ai-systems-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #academicpapers #cryptanalysis #Uncategorized #Cryptography #AI
-
Implementing Cryptography in AI Systems
Interesting research: “How to Securely Implement Cryptography in Deep Neural Networks.”
Abstract: The wide adoption of deep neural networks (DNNs) raises the ques... https://www.schneier.com/blog/archives/2025/02/implementing-cryptography-in-ai-systems.html#academicpapers #Uncategorized #cryptanalysis #cryptography #AI
-
University of Borås: AI-fabricated “junk science” floods Google Scholar. “AI-generated research is a threat, both in terms of society’s knowledge and public trust in science. This was the conclusion made by the researchers behind the study that recently identified over a hundred suspected AI-generated articles in the Google Scholar search engine.”
-
YubiKey Side-Channel Attack
There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s use... https://www.schneier.com/blog/archives/2024/09/yubikey-side-channel-attack.html
#side-channelattacks #securityanalysis #academicpapers #securitytokens #Uncategorized #cloning
-
New Attack Against Self-Driving Car AI – Source: www.schneier.com https://ciso2ciso.com/new-attack-against-self-driving-car-ai-source-www-schneier-com/ #rssfeedpostgeneratorecho #ArtificialIntelligence #SchneierOnSecurity #sidechannelattacks #SchneieronSecurity #CyberSecurityNews #academicpapers #Uncategorized #Cyberattack #cars
-
Poisoning AI Models
New research into poisoning AI models:
The researchers first trained the AI... https://www.schneier.com/blog/archives/2024/01/poisoning-ai-models.html#artificialintelligence #machinelearning #academicpapers #Uncategorized #threatmodels #LLM