Beyond Mesons and Baryons: The Quest for Exotic Hadrons
A new review explores the theoretical landscape of multiquark states, examining the forces that could bind these unusual configurations of quarks.
A new review explores the theoretical landscape of multiquark states, examining the forces that could bind these unusual configurations of quarks.
![The weighted secrecy outage probability diminishes as the quality of service requirement [latex]R_k^{QoS}[/latex] increases, demonstrating a fundamental relationship between reliability and performance in the system.](https://arxiv.org/html/2601.22499v1/x4.png)
A new approach combining aerial drones and reconfigurable intelligent surfaces dramatically improves the reliability of secure millimeter wave communications.

Researchers have mapped the behavior of the integer quantum Hall transition onto disordered networks, revealing fundamental connections to gravity and confirming predictions about critical exponents.
Researchers have created a realistic test suite to assess how well large language models generate code that is both functional and free of security vulnerabilities.

A novel framework optimizes the compression of large language models by strategically reordering data before quantization, dramatically improving accuracy and reducing computational costs.
![Semantic caching vulnerabilities arise when distinct requests, such as [latex]A_1[/latex] (attacker) and [latex]P_1[/latex] (victim), unexpectedly resolve to the same semantic key [latex]K_1[/latex], enabling the attacker to hijack the victim’s response.](https://arxiv.org/html/2601.23088v1/x1.png)
A new attack demonstrates how manipulating the fuzzy matching used to speed up large language model responses can allow attackers to control agent behavior.
This review details a novel architecture for the Number Theoretic Transform designed to withstand both control flow and timing-based hardware Trojan attacks.
Researchers are harnessing the power of established classical BCH codes to construct optimized, locally recoverable quantum codes for more resilient quantum computing.
This review introduces a novel approach to stochastic linear quadratic control, offering a robust method for optimizing systems under uncertainty.
![The study delineates constraints on parameters [latex]\alpha_{1}[/latex] and [latex]\alpha_{3}[/latex], establishing that a stable condition requires [latex] \frac{7}{2}\alpha_{1} + \frac{4}{5}\alpha_{3} \geq 0[/latex], while a further limitation dictates that [latex] 4\alpha_{1} - |\alpha_{3}| \geq 0[/latex].](https://arxiv.org/html/2601.20962v1/x2.png)
New research reveals how the subtle deformability of highly charged black holes connects to fundamental limits on gravity and the behavior of quantum fields.