Taking Flight with Trust: Securing the Future of Urban Air Mobility

As electric vertical takeoff and landing (eVTOL) aircraft prepare for takeoff, ensuring robust cybersecurity is paramount for safe and reliable urban air mobility.

As electric vertical takeoff and landing (eVTOL) aircraft prepare for takeoff, ensuring robust cybersecurity is paramount for safe and reliable urban air mobility.

New research reveals how subtle manipulations of text prompts can bypass safeguards in large language models, exposing a critical weakness in AI security.
![The study of pentaquark decay pathways-specifically [latex]Pc(4410) \rightarrow \eta_c \Delta[/latex] and [latex]Pc(4410) \rightarrow J/\psi \Delta[/latex]-reveals sensitivity to Borel window variations, suggesting a nuanced relationship between decay constants and the parameters used in analyzing hadron interactions.](https://arxiv.org/html/2601.14723v1/x4.png)
A new systematic study using QCD sum rules sheds light on the decay patterns of recently discovered pentaquark states, helping to determine if they are tightly bound or loosely connected molecular structures.

New research reveals that interconnected superfluid rings can sustain persistent currents through a collective synchronization effect, offering insights into the behavior of complex quantum systems.
A precise calculation of the B → μ⁻ν̄μ decay process pushes the boundaries of particle physics accuracy.

Researchers have developed a new method for concealing messages within text that is both demonstrably secure and remarkably resistant to detection.

A new co-design framework dramatically improves the performance of small language models on resource-constrained devices.
![The study demonstrates that shaping and optimization-based modulation schemes, specifically with a parameter setting of [latex]M=16[/latex], allow for nuanced control over a system’s behavior, suggesting that complex outcomes can be achieved by carefully calibrating these fundamental parameters.](https://arxiv.org/html/2601.15004v1/Figure_02_Constellations_Part2.png)
Optimizing modulation schemes for power consumption, alongside traditional metrics, is becoming increasingly critical for the future of wireless networks.
![A procedure designed to minimize breaks in data comparison-initially requiring 12 breaks-can be optimized through targeted merging of substrings, progressively reducing the break count to 6 by accepting a corresponding increase in omitted bits, with the most efficient merges achieved by prioritizing the shortest substrings-such as [latex]c_3[/latex], [latex]c_5[/latex], and [latex]c_2[/latex]-to balance computational cost and data loss.](https://arxiv.org/html/2601.14623v1/x4.png)
A new coding scheme offers robust data recovery even when information is broken into arbitrary pieces and some are irretrievably lost.
A new implementation combines post-quantum cryptography with established symmetric encryption to deliver secure communication in the age of quantum computing.