The Limits of Efficient Algorithms for Identifying Code

A new proof demonstrates that the long-studied Identifying Code problem is unlikely to have a fast, practical solution, resolving a key question in parameterized complexity.

A new proof demonstrates that the long-studied Identifying Code problem is unlikely to have a fast, practical solution, resolving a key question in parameterized complexity.

Researchers have developed a new framework that eliminates the need for reference images in detecting camouflaged objects, relying instead on distilled category knowledge and adaptive feature alignment.

New research explores how large language models perform on tasks requiring strict adherence to orthographic rules, revealing surprising weaknesses despite their fluency.

New research introduces a benchmark and metric to test how well AI systems maintain consistent answers when faced with paraphrased queries.

New research offers a streamlined approach to accurately locate short circuits in wind farms increasingly reliant on inverter-based resources.

New research provides tools to quantify and mitigate the risk of cascading failures in multi-agent systems grappling with unpredictable delays and network conditions.
New research establishes fundamental constraints on how compactly data can be encoded for reliable, localized decoding.

A new framework uses digital twin technology and game theory to enhance secure service selection in the complex landscape of space-air-ground integrated networks.
![Clients employ a privacy-preserving federated learning approach by extracting $768$-dimensional $[CLS]$ tokens from a Vision Transformer, encrypting them with the CKKS scheme, and enabling the server to aggregate information across numerous clients while performing encrypted inference.](https://arxiv.org/html/2511.20983v1/x1.png)
A novel framework combines the power of vision transformers with lightweight encryption to enable privacy-preserving medical image analysis across distributed datasets.

New research proves an optimal strategy for dodging pursuers relies on sharp, on-off maneuvers, and presents a practical method for implementing it in real-time.