Defense MEDIUM
Maryam Abbasihafshejani, AHM Nazmus Sakib, Murtuza Jadliwala
The rapid advancement of speech synthesis technologies, including text-to-speech (TTS) and voice conversion (VC), has intensified security and...
4 months ago cs.SD cs.AI cs.CR
PDF
Defense HIGH
Yun Bian, Yi Chen, HaiQuan Wang +2 more
Software vulnerability detection can be formulated as a binary classification problem that determines whether a given code snippet contains security...
4 months ago cs.SE cs.AI cs.CR
PDF
Defense LOW
Rajiv Thummala, Katherine Winton, Luke Flores +2 more
Out-of-band screening of microcontrollers is a major gap in semiconductor supply chain security. High-assurance techniques such as X-ray and...
Defense MEDIUM
Hyunjun Kim
Guardrail models are essential for ensuring the safety of Large Language Model (LLM) deployments, but processing full multi-turn conversation...
4 months ago cs.CL cs.AI
PDF
Defense MEDIUM
Weijie Wang, Peizhuo Lv, Yan Wang +7 more
Graph Retrieval-Augmented Generation (GraphRAG) has emerged as a key technique for enhancing Large Language Models (LLMs) with proprietary Knowledge...
Defense MEDIUM
Yuchao Hou, Zixuan Zhang, Jie Wang +9 more
As a critical application of computational intelligence in remote sensing, deep learning-based synthetic aperture radar (SAR) image target...
4 months ago cs.CR cs.CV cs.LG
PDF
Defense MEDIUM
Samaresh Kumar Singh, Joyjit Roy, Martin So
Recent attacks on critical infrastructure, including the 2021 Oldsmar water treatment breach and 2023 Danish energy sector compromises, highlight...
4 months ago cs.LG cs.AI cs.CR
PDF
Defense LOW
Alessio Benavoli, Alessandro Facchini, Marco Zaffalon
How can we ensure that AI systems are aligned with human values and remain safe? We can study this problem through the frameworks of the AI...
4 months ago cs.AI cs.GT
PDF
Defense HIGH
Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan +2 more
The software supply chain attacks are becoming more and more focused on trusted development and delivery procedures, so the conventional post-build...
4 months ago cs.CR cs.AI
PDF
Defense LOW
Xingwei Ma, Shiyang Feng, Bo Zhang +1 more
Remote sensing change detection (RSCD), a complex multi-image inference task, traditionally uses pixel-based operators or encoder-decoder networks...
4 months ago cs.CV cs.AI
PDF
Defense LOW
Eranga Bandara, Tharaka Hewa, Ross Gore +12 more
Agentic AI represents a major shift in how autonomous systems reason, plan, and execute multi-step tasks through the coordination of Large Language...
Defense LOW
Long Zhang, Wei-neng Chen
The increasing integration of Large Language Models (LLMs) into decision-making frameworks has exposed significant vulnerabilities to social...
Defense LOW
Le Wang, Zonghao Ying, Xiao Yang +7 more
Embodied agents powered by vision-language models (VLMs) are increasingly capable of executing complex real-world tasks, yet they remain vulnerable...
4 months ago cs.AI cs.CV cs.RO
PDF
Defense MEDIUM
Anselm Paulus, Ilia Kulikov, Brandon Amos +4 more
Ensuring the safety of language models (LMs) while maintaining their usefulness remains a critical challenge in AI alignment. Current approaches rely...
Defense MEDIUM
Md Minhazul Islam Munna, Md Mahbubur Rahman, Jaroslav Frnda +2 more
The proliferation of IoT devices and their reliance on Wi-Fi networks have introduced significant security vulnerabilities, particularly the KRACK...
4 months ago cs.CR cs.LG
PDF
Defense MEDIUM
Kun Zhao, Siyuan Dai, Yingying Zhang +9 more
Early detection of Alzheimer's disease (AD) requires models capable of integrating macro-scale neuroanatomical alterations with micro-scale genetic...
4 months ago cs.LG cs.AI
PDF
Defense LOW
Yang Ni, Tong Yang
Large Language Models (LLMs) and AI chatbots are increasingly used for emotional and mental health support due to their low cost, immediacy, and...
4 months ago cs.CY cs.HC
PDF
Defense MEDIUM
Haotian Deng, Chris Farber, Jiyoon Lee +1 more
Automated short-answer grading (ASAG) remains a challenging task due to the linguistic variability of student responses and the need for nuanced,...
4 months ago cs.CL cs.LG
PDF
Defense LOW
Yueqiao Jin, Roberto Martinez-Maldonado, Dragan Gašević +1 more
Generative AI is increasingly embedded in collaborative learning, yet little is known about how AI personas shape learner agency when AI teammates...
Defense LOW
Nenad Tomašev, Matija Franklin, Julian Jacobs +2 more
AI safety and alignment research has predominantly been focused on methods for safeguarding individual AI systems, resting on the assumption of an...
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial