Beyond Reasoning: Uncovering the Weaknesses in AI Safety

A new analysis reveals that while advanced reasoning skills are important, they don’t fully protect large language models from sophisticated adversarial attacks.

A new analysis reveals that while advanced reasoning skills are important, they don’t fully protect large language models from sophisticated adversarial attacks.
A new algorithm efficiently unlocks the full potential of Hyperderivative Reed-Solomon codes for robust data transmission.

A novel optimization approach leverages the power of quantum-inspired computing to build more robust and cost-effective supply chain networks.
![A variational quantum circuit, structured to a depth of two and utilizing three qubits, encodes problem Hamiltonians with [latex]R_z[/latex] gates for phase separation within the Quantum Approximate Optimization Algorithm, while [latex]R_x[/latex] gates function as mixing operations.](https://arxiv.org/html/2601.03278v1/Circuit.png)
Researchers are exploring the potential of quantum computing to enhance Markowitz portfolio theory and tackle complex investment constraints.
A new analysis reveals how key parameters in the LINEture digital signature scheme can be optimized to bolster security and efficiency in the age of quantum computing.

A new framework uses knowledge graphs and artificial intelligence to assess and strengthen enterprise cybersecurity in the face of looming quantum computing advancements.
Researchers have refined calculations of how heavy quarks participate in deep-inelastic scattering, offering improved predictions for high-energy physics experiments.

Researchers have developed a new technique to embed robust watermarks into code generated by artificial intelligence, ensuring both functionality and security.
![Figure 1: Illustration of a multi-agent particle system with interactions governed by a potential field. Particles repel each other with a force proportional to [latex]1/r[/latex], preventing overlap and maintaining a minimal distance.](https://arxiv.org/html/2601.02949v1/figures/architecture_v1.jpg)
This review examines the growing need for interoperability between blockchains and how emerging frameworks are striving to overcome the limitations of isolated networks.
![Through the fusion of key-value (KV) cache blocks, the computational footprint during batch decoding is demonstrably reduced, and efficiency is further enhanced by enabling the reuse of computations across unified representations of data chunks - a strategy illustrated by the shared computation of chunks 0, 1, and 2, effectively minimizing redundant matrix operations and optimizing performance via [latex] KV [/latex] cache management.](https://arxiv.org/html/2601.03067v1/figures/assets/shared_chunks.png)
A new technique efficiently compresses and reuses memory caches, significantly boosting the speed and scalability of large language model serving.