Benchmark MEDIUM
Han Yang, Shaofeng Li, Tian Dong +3 more
Deep Neural Networks (DNNs), as valuable intellectual property, face unauthorized use. Existing protections, such as digital watermarking, are...
5 months ago cs.CR cs.LG
PDF
Benchmark HIGH
Chaomeng Lu, Bert Lagaisse
Vulnerability detection methods based on deep learning (DL) have shown strong performance on benchmark datasets, yet their real-world effectiveness...
5 months ago cs.CR cs.LG cs.SE
PDF
Benchmark MEDIUM
N Mangala, Murtaza Rangwala, S Aishwarya +5 more
Healthcare has become exceptionally sophisticated, as wearables and connected medical devices are revolutionising remote patient monitoring,...
5 months ago cs.CR cs.DC
PDF
Benchmark HIGH
Devanshu Sahoo, Vasudev Majhi, Arjun Neekhra +3 more
The use of Large Language Models (LLMs) as automatic judges for code evaluation is becoming increasingly prevalent in academic environments. But...
5 months ago cs.SE cs.AI
PDF
Benchmark LOW
Yash Srivastava, Shalin Jain, Sneha Awathare +1 more
The rising demand for collaborative machine learning and data analytics calls for secure and decentralized data sharing frameworks that balance...
5 months ago cs.CR cs.AI cs.DC
PDF
Benchmark MEDIUM
Jan Betley, Jorio Cocola, Dylan Feng +4 more
LLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow...
5 months ago cs.CL cs.AI cs.CR
PDF
Benchmark MEDIUM
Aink Acrie Soe Thein, Nikolaos Pitropakis, Pavlos Papadopoulos +2 more
With the adoption of multiple digital devices in everyday life, the cyber-attack surface has increased. Adversaries are continuously exploring new...
5 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Xinye Cao, Yihan Lin, Guoshun Nan +9 more
Zero-Touch Networks (ZTNs) represent a transformative paradigm toward fully automated and intelligent network management, providing the scalability...
5 months ago cs.CR cs.AI
PDF
Benchmark HIGH
Futa Waseda, Shojiro Yamabe, Daiki Shiono +2 more
Large vision-language models (LVLMs) are vulnerable to typographic attacks, where misleading text within an image overrides visual understanding....
Benchmark LOW
Bethel Hall, Owen Ungaro, William Eiers
Access control policies are vital for securing modern cloud computing, where organizations must manage access to sensitive data across thousands of...
5 months ago cs.DC cs.CR cs.SE
PDF
Benchmark LOW
Anantaa Kotal, Anupam Joshi
The widespread use of big data across sectors has raised major privacy concerns, especially when sensitive information is shared or analyzed....
5 months ago cs.LG cs.AI cs.CR
PDF
Benchmark LOW
Shuyue Hu, Haoyang Yan, Yiqun Zhang +3 more
Foundation models (FMs) are increasingly assuming the role of the ''brain'' of AI agents. While recent efforts have begun to equip FMs with native...
5 months ago cs.AI cs.MA
PDF
Benchmark LOW
Manos Plitsis, Giorgos Bouritsas, Vassilis Katsouros +1 more
Text-to-image (TTI) diffusion models have achieved remarkable visual quality, yet they have been repeatedly shown to exhibit social biases across...
Benchmark MEDIUM
Gary Ackerman, Zachary Kallenborn, Anna Wetzel +7 more
The potential for rapidly-evolving frontier artificial intelligence (AI) models, especially large language models (LLMs), to facilitate bioterrorism...
5 months ago cs.LG cs.AI cs.CY
PDF
Benchmark MEDIUM
Md Nazmul Haque, Elizabeth Lin, Lawrence Arkoh +2 more
Large Language Models for code (LLMs4Code) are increasingly used to generate software artifacts, including library and package recommendations in...
Benchmark MEDIUM
Lukas Johannes Möller
The escalating sophistication and variety of cyber threats have rendered static honeypots inadequate, necessitating adaptive, intelligence-driven...
5 months ago cs.CR cs.DC cs.LG
PDF
Benchmark MEDIUM
Jordan Taylor, Sid Black, Dillon Bowen +10 more
Future AI systems could conceal their capabilities ('sandbagging') during evaluations, potentially misleading developers and auditors. We...
Benchmark LOW
Sangha Park, Seungryong Yoo, Jisoo Mok +1 more
Although Multimodal Large Language Models (MLLMs) have advanced substantially, they remain vulnerable to object hallucination caused by language...
5 months ago cs.CV cs.AI
PDF
Benchmark LOW
Alisha Ukani, Hamed Haddadi, Ali Shahin Shamsabadi +1 more
This paper presents a systematic evaluation of the privacy behaviors and attributes of eight recent, popular browser agents. Browser agents are...
Benchmark MEDIUM
JV Roig
We investigate how large language models (LLMs) fail when operating as autonomous agents with tool-use capabilities. Using the Kamiwaza Agentic Merit...
5 months ago cs.AI cs.SE
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial