Attack HIGH
Scott Thornton
Large language models remain vulnerable to jailbreak attacks, and single-layer defenses often trade security for usability. We present TRYLOCK, the...
4 months ago cs.CR cs.LG
PDF
Attack MEDIUM
Ahmed Ahmed, A. Feder Cooper, Sanmi Koyejo +1 more
Many unresolved legal questions over LLMs and copyright center on memorization: whether specific training data have been encoded in the model's...
4 months ago cs.CL cs.AI cs.LG
PDF
Attack HIGH
Devang Kulshreshtha, Hang Su, Chinmay Hegde +1 more
Most jailbreak methods achieve high attack success rates (ASR) but require attacker LLMs to craft adversarial queries and/or demand high query...
Attack MEDIUM
Neusha Javidnia, Ruisi Zhang, Ashish Kundu +1 more
We present SWaRL, a robust and fidelity-preserving watermarking framework designed to protect the intellectual property of code LLM owners by...
4 months ago cs.CR cs.LG
PDF
Attack HIGH
Alexandre Le Mercier, Chris Develder, Thomas Demeester
State space models (SSMs) like Mamba offer efficient alternatives to Transformer-based language models, with linear time complexity. Yet, their...
Attack HIGH
Alexandre Le Mercier, Chris Develder, Thomas Demeester
State space models (SSMs) like Mamba offer efficient alternatives to Transformer-based language models, with linear time complexity. Yet, their...
Attack MEDIUM
Jiwei Guan, Haibo Jin, Haohan Wang
Recent advancements in Large Vision-Language Models (LVLMs) have shown groundbreaking capabilities across diverse multimodal tasks. However, these...
4 months ago cs.CR cs.AI cs.CV
PDF
Attack MEDIUM
Davis Brown, Juan-Pablo Rivera, Dan Hendrycks +1 more
As frontier AIs become more powerful and costly to develop, adversaries have increasing incentives to steal model weights by mounting exfiltration...
4 months ago cs.CR cs.AI cs.LG
PDF
Attack MEDIUM
Jiajie Zhu, Xia Du, Xiaoyuan Liu +4 more
The rapid advancements in artificial intelligence have significantly accelerated the adoption of speech recognition technology, leading to its...
4 months ago cs.SD cs.CR cs.MM
PDF
Attack HIGH
M P V S Gopinadh, S Mahaboob Hussain
Large Language Models (LLMs) are integral to modern AI applications, but their safety alignment mechanisms can be bypassed through adversarial prompt...
4 months ago cs.CR cs.AI
PDF
Attack LOW
Zhenhong Zhou, Shilinlu Yan, Chuanpu Liu +3 more
Large language models (LLMs) are increasingly deployed in cost-sensitive and on-device scenarios, and safety guardrails have advanced mainly in...
Attack HIGH
Md Mahbub Hasan, Marcus Sternhagen, Krishna Chandra Roy
Additive manufacturing (AM) is rapidly integrating into critical sectors such as aerospace, automotive, and healthcare. However, this cyber-physical...
4 months ago cs.CR cs.AI cs.LG
PDF
Attack MEDIUM
Nandish Chattopadhyay, Abdul Basit, Amira Guesmi +3 more
Adversarial attacks pose a significant challenge to the reliable deployment of machine learning models in EdgeAI applications, such as autonomous...
4 months ago cs.CR cs.AI
PDF
Attack MEDIUM
Fumiya Morimoto, Ryuto Morita, Satoshi Ono
Deep neural network-based classifiers are prone to errors when processing adversarial examples (AEs). AEs are minimally perturbed input data...
4 months ago cs.CR cs.LG cs.NE
PDF
Attack HIGH
Haoran Gu, Handing Wang, Yi Mei +2 more
The widespread deployment of large language models (LLMs) has raised growing concerns about their misuse risks and associated safety issues. While...
4 months ago cs.CR cs.CL
PDF
Attack MEDIUM
Xiaoze Liu, Weichen Yu, Matt Fredrikson +2 more
The open-weight language model ecosystem is increasingly defined by model composition techniques (such as weight merging, speculative decoding, and...
4 months ago cs.LG cs.CL cs.CR
PDF
Attack HIGH
Manish Bhatt, Adrian Wood, Idan Habler +1 more
Production LLM agents with tool-using capabilities require security testing despite their safety training. We adapt Go-Explore to evaluate...
4 months ago cs.CR cs.AI cs.LG
PDF
Attack HIGH
Ruben Neyroud, Sam Corley
While most LLMs are autoregressive, diffusion-based LLMs have recently emerged as an alternative method for generation. Greedy Coordinate Gradient...
4 months ago cs.LG cs.CL cs.CR
PDF
Attack LOW
Yalin E. Sagduyu, Tugba Erpek, Aylin Yener +1 more
Semantic communications conveys task-relevant meaning rather than focusing solely on message reconstruction, improving bandwidth efficiency and...
4 months ago cs.NI cs.AI cs.CR
PDF
Attack MEDIUM
Pankayaraj Pathmanathan, Michael-Andrei Panaitescu-Liess, Cho-Yu Jason Chiang +1 more
Retrieval-Augmented Generation (RAG) has emerged as a promising paradigm to enhance large language models (LLMs) with external knowledge, reducing...
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial