Benchmark HIGH
Priyaranjan Pattnayak, Sanchari Chowdhuri
Safety alignment of large language models (LLMs) is mostly evaluated in English and contract-bound, leaving multilingual vulnerabilities...
2 months ago cs.AI cs.CL
PDF
Benchmark MEDIUM
Simon Lermen, Daniel Paleka, Joshua Swanson +3 more
We show that large language models can be used to perform at-scale deanonymization. With full Internet access, our agent can re-identify Hacker News...
2 months ago cs.CR cs.AI cs.LG
PDF
Benchmark LOW
Stephan Rabanser, Sayash Kapoor, Peter Kirgis +3 more
AI agents are increasingly deployed to execute important tasks. While rising accuracy scores on standard benchmarks suggest rapid progress, many...
2 months ago cs.AI cs.CY cs.LG
PDF
Benchmark MEDIUM
Michael Cunningham
We present a practical system for privacy-aware large language model (LLM) inference that splits a transformer between a trusted local GPU and an...
2 months ago cs.CR cs.DC
PDF
Benchmark MEDIUM
Nivya Talokar, Ayush K Tarun, Murari Mandal +2 more
LLM-based agents execute real-world workflows via tools and memory. These affordances enable ill-intended adversaries to also use these agents to...
2 months ago cs.CL cs.LG
PDF
Benchmark MEDIUM
Johannes Bertram, Jonas Geiping
We introduce NESSiE, the NEceSsary SafEty benchmark for large language models (LLMs). With minimal test cases of information and access security,...
2 months ago cs.CR cs.SE
PDF
Benchmark MEDIUM
Shahriar Golchin, Marc Wetter
We systematically evaluate the quality of widely used AI safety datasets from two perspectives: in isolation and in practice. In isolation, we...
2 months ago cs.CR cs.AI cs.CL
PDF
Benchmark MEDIUM
Haodong Zhao, Jinming Hu, Gongshen Liu
Federated learning security research has predominantly focused on backdoor threats from a minority of malicious clients that intentionally corrupt...
Benchmark LOW
Aditi Prabakaran, Priyesh Shukla
Transient objects in casual multi-view captures cause ghosting artifacts in 3D Gaussian Splatting (3DGS) reconstruction. Existing solutions relied on...
Benchmark LOW
Udbhav Prasad, Aniesh Chawla
Cryptographic digests (e.g., MD5, SHA-256) are designed to provide exact identity. Any single-bit change in the input produces a completely different...
2 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Max Fomin
Detecting prompt injection and jailbreak attacks is critical for deploying LLM-based agents safely. As agents increasingly process untrusted data...
Benchmark LOW
Edibe Yilmaz, Kahraman Kostas
The integration of large language models (LLMs) into educational processes introduces significant constraints regarding data privacy and reliability,...
2 months ago cs.CL cs.AI cs.CR
PDF
Benchmark HIGH
Haoyu Li, Xijia Che, Yanhao Wang +2 more
Proof-of-Vulnerability (PoV) generation is a critical task in software security, serving as a cornerstone for vulnerability validation, false...
2 months ago cs.SE cs.CR
PDF
Benchmark MEDIUM
Mohamed Shaaban, Mohamed Elmahallawy
Federated learning (FL) enables collaborative training across organizational silos without sharing raw data, making it attractive for...
2 months ago cs.CR cs.CL
PDF
Benchmark MEDIUM
Anudeep Das, Prach Chantasantitam, Gurjot Singh +3 more
Large language models (LLMs) are increasingly deployed in settings where inducing a bias toward a certain topic can have significant consequences,...
2 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Xu Li, Simon Yu, Minzhou Pan +5 more
LLM-based agents are becoming increasingly capable, yet their safety lags behind. This creates a gap between what agents can do and should do. This...
2 months ago cs.CR cs.AI cs.CL
PDF
Benchmark MEDIUM
Tailia Malloy, Tegawende F. Bissyande
Large Language Models are expanding beyond being a tool humans use and into independent agents that can observe an environment, reason about...
2 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Nataša Krčo, Zexi Yao, Matthieu Meeus +1 more
Data containing personal information is increasingly used to train, fine-tune, or query Large Language Models (LLMs). Text is typically scrubbed of...
2 months ago cs.CL cs.AI cs.CR
PDF
Benchmark LOW
Rosie Zhao, Anshul Shah, Xiaoyu Zhu +5 more
Reinforcement learning (RL) fine-tuning has become a key technique for enhancing large language models (LLMs) on reasoning-intensive tasks,...
Benchmark HIGH
André Storhaug, Jiamou Sun, Jingyue Li
Identifying vulnerability-fixing commits corresponding to disclosed CVEs is essential for secure software maintenance but remains challenging at...
2 months ago cs.SE cs.AI cs.CR
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial