Attack HIGH
Yuan Xin, Dingfan Chen, Linyi Yang +2 more
As large language models (LLMs) are increasingly deployed, ensuring their safe use is paramount. Jailbreaking, adversarial prompts that bypass model...
4 months ago cs.CR cs.AI cs.CL
PDF
Attack MEDIUM
Ruixuan Huang, Qingyue Wang, Hantao Huang +4 more
Mixture-of-Experts architectures have become the standard for scaling large language models due to their superior parameter efficiency. To...
4 months ago cs.CR cs.LG
PDF
Attack HIGH
Roee Ziv, Raz Lapid, Moshe Sipper
Audio-language models combine audio encoders with large language models to enable multimodal reasoning, but they also introduce new security...
4 months ago cs.SD cs.AI cs.CR
PDF
Attack HIGH
Jiawei Liu, Zhuo Chen, Rui Zhu +4 more
Neural ranking models have achieved remarkable progress and are now widely deployed in real-world applications such as Retrieval-Augmented Generation...
4 months ago cs.CR cs.IR
PDF
Attack HIGH
Zhen Liang, Hai Huang, Zhengkui Chen
Large language models (LLMs), such as ChatGPT, have achieved remarkable success across a wide range of fields. However, their trustworthiness remains...
4 months ago cs.CR cs.AI
PDF
Attack HIGH
Soham Padia, Dhananjay Vaidya, Ramchandra Mangrulkar
Securing blockchain-enabled IoT networks against sophisticated adversarial attacks remains a critical challenge. This paper presents a trust-based...
4 months ago cs.CR cs.LG cs.MA
PDF
Attack HIGH
Zongmin Zhang, Zhen Sun, Yifan Liao +5 more
Prompt-driven Video Segmentation Foundation Models (VSFMs) such as SAM2 are increasingly deployed in applications like autonomous driving and digital...
4 months ago cs.CV cs.CR
PDF
Attack LOW
Jiayu Hu, Beibei Li, Jiangwei Xia +3 more
While Vision-Language Models (VLMs) have garnered increasing attention in the AI community due to their promising practical applications, they...
4 months ago cs.CV cs.LG
PDF
Attack HIGH
Mengqi He, Xinyu Tian, Xin Shen +4 more
Vision-language models (VLMs) achieve remarkable performance but remain vulnerable to adversarial attacks. Entropy, a measure of model uncertainty,...
4 months ago cs.CV cs.LG
PDF
Attack MEDIUM
Tsogt-Ochir Enkhbayar
Warning-framed content in training data (e.g., "DO NOT USE - this code is vulnerable") does not, it turns out, teach language models to avoid the...
4 months ago cs.LG cs.CL cs.CR
PDF
Attack MEDIUM
Tian Li, Bo Lin, Shangwen Wang +1 more
Retrieval-Augmented Code Generation (RACG) is increasingly adopted to enhance Large Language Models for software development, yet its security...
4 months ago cs.CR cs.SE
PDF
Attack HIGH
Duo Chai, Zizhen Liu, Shuhuai Wang +4 more
Large language models (LLMs) are highly compute- and memory-intensive, posing significant demands on high-performance GPUs. At the same time,...
4 months ago cs.AR cs.AI cs.CR
PDF
Attack HIGH
Tianwei Lan, Farid Naït-Abdesselam
The rapid growth in both the scale and complexity of Android malware has driven the widespread adoption of machine learning (ML) techniques for...
4 months ago cs.CR cs.AI
PDF
Attack MEDIUM
Haoyang Li, Mingjin Li, Jinxin Zuo +5 more
LLM-based code agents(e.g., ChatGPT Codex) are increasingly deployed as detector for code review and security auditing tasks. Although CoT-enhanced...
4 months ago cs.CR cs.MA
PDF
Attack HIGH
Xinjie Xu, Shuyu Cheng, Dongwei Xu +2 more
In hard-label black-box adversarial attacks, where only the top-1 predicted label is accessible, the prohibitive query complexity poses a major...
4 months ago cs.LG cs.AI cs.CR
PDF
Attack MEDIUM
Ahmed M. Hussain, Salahuddin Salahuddin, Panos Papadimitratos
Current Large Language Models (LLMs) safety approaches focus on explicitly harmful content while overlooking a critical vulnerability: the inability...
4 months ago cs.AI cs.CL cs.CR
PDF
Attack HIGH
Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami +2 more
Mixture-of-Experts (MoE) architectures have advanced the scaling of Large Language Models (LLMs) by activating only a sparse subset of parameters per...
Attack HIGH
Yihan Wang, Huanqi Yang, Shantanu Pal +1 more
The integration of Large Language Models (LLMs) into wearable sensing is creating a new class of mobile applications capable of nuanced human...
Attack MEDIUM
Yifan Yao, Baojuan Wang, Jinhao Duan +4 more
Chat-based cybercrime has emerged as a pervasive threat, with attackers leveraging real-time messaging platforms to conduct scams that rely on...
Attack HIGH
Omer Gazit, Yael Itzhakev, Yuval Elovici +1 more
Radio frequency (RF) based systems are increasingly used to detect drones by analyzing their RF signal patterns, converting them into spectrogram...
4 months ago cs.CR cs.LG
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial