Beyond Relief: AI for Fairer Flood Recovery

A new framework uses artificial intelligence to address bias in post-disaster aid distribution, ensuring more equitable support for vulnerable communities.

A new framework uses artificial intelligence to address bias in post-disaster aid distribution, ensuring more equitable support for vulnerable communities.

A new framework leverages artificial intelligence to proactively defend software supply chains against evolving vulnerabilities.

This review examines how to strengthen power systems and the communities they serve against increasingly frequent and severe disruptions.

A new analysis of developer forums reveals a disconnect between theoretical AI risks and the practical security challenges faced in building and deploying AI-powered projects.

A new expert system leverages global liquidity data alongside advanced time-series forecasting to achieve more accurate long-term Bitcoin price predictions.
![The ARC framework establishes a recursive approach to reasoning, wherein complex problems are decomposed into simpler subproblems until reaching a base case solvable with a defined operator [latex] \mathcal{R} [/latex], thus enabling compositional generalization and systematic program execution.](https://arxiv.org/html/2512.22211v1/arc_overview3.png)
As artificial intelligence systems gain increasing autonomy, a structured approach to managing their potential risks is becoming critical.

As cyberattacks grow more sophisticated, a new security paradigm is emerging that leverages intelligent, autonomous AI agents to adapt and respond to threats in real-time.

A new study explores how incorporating climate variability indices into machine learning models can improve the pricing and risk assessment of catastrophe bonds.

A new machine learning framework leverages weather patterns and socio-economic data to forecast power disruptions caused by extreme events.

As artificial intelligence systems become increasingly integrated into critical infrastructure, securing them against adversarial attacks and data manipulation is paramount.