Ying Li
4 papers ยท Latest:
Cryptography & Security
Options, Not Clicks: Lattice Refinement for Consent-Driven MCP Authorization
Conleash is a client-side middleware that uses a risk lattice and policy engine to provide consent-driven, boundary-scoped authorization for MCP tool invocations.
2605.11360
RoboticsVEGA: Visual Encoder Grounding Alignment for Spatially-Aware Vision-Language-Action Models
VEGA enhances VLA models' spatial reasoning by directly aligning their visual encoder outputs with 3D-aware features, improving robotic manipulation.
2605.10485
Cryptography & SecuritySemia: Auditing Agent Skills via Constraint-Guided Representation Synthesis
Semia audits LLM agent skills by converting them into a Datalog fact base using CGRS, finding critical risks in over half of real-world skills.
2605.00314
Software EngineeringE2E-REME: Towards End-to-End Microservices Auto-Remediation via Experience-Simulation Reinforcement Fine-Tuning
E2E-REME introduces an end-to-end model for autonomous microservice remediation, generating executable playbooks directly from diagnosis reports.
2604.11094
๐ฌ Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week โ summarized, scored, and delivered to your inbox every Monday.