Defense MEDIUM
Mengxuan Hu, Vivek V. Datla, Anoop Kumar +4 more
Recent advances in alignment techniques such as Supervised Fine-Tuning (SFT), Reinforcement Learning from Human Feedback (RLHF), and Direct...
4 weeks ago cs.CL cs.AI
PDF
Defense MEDIUM
Morteza Eskandarian, Mahdi Rabbani, Arun Kaniyamattam +6 more
The current generation of large language models produces sophisticated social-engineering content that bypasses standard text screening systems in...
Defense MEDIUM
Chun Yan Ryan Kan, Tommy Tran, Vedant Yadav +4 more
Defending LLMs against adversarial jailbreak attacks remains an open challenge. Existing defenses rely on binary classifiers that fail when...
1 months ago cs.CR cs.AI cs.CL
PDF
Defense LOW
Imgyeong Lee, Tayyib Ul Hassan, Abram Hindle
Artificial Intelligence (AI) increasingly automates various parts of the software development tasks. Although AI has enhanced the productivity of...
Defense MEDIUM
Zachary Coalson, Beth Sohler, Aiden Gabriel +1 more
We identify a structural weakness in current large language model (LLM) alignment: modern refusal mechanisms are fail-open. While existing approaches...
1 months ago cs.LG cs.CR
PDF
Defense MEDIUM
Sasha Behrouzi, Lichao Wu, Mohamadreza Rostami +1 more
Safety alignment is essential for the responsible deployment of large language models (LLMs). Yet, existing approaches often rely on heavyweight...
1 months ago cs.CR cs.LG
PDF
Defense LOW
Robert Ranisch, Sabine Salloch
The emergence of agentic AI marks a new phase in the digital transformation of healthcare. Distinct from conventional generative AI, agentic AI...
Defense MEDIUM
Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid +4 more
The prevalence of malicious packages in open-source repositories, such as PyPI, poses a critical threat to the software supply chain. While Large...
1 months ago cs.CR cs.SE
PDF
Defense LOW
Huijia Lin, Kameron Shahabi, Min Jae Song
Language models now routinely produce text that is difficult to distinguish from human writing, raising the need for robust tools to verify content...
1 months ago cs.CR cs.AI cs.LG
PDF
Defense LOW
Manuel Cherep, Pranav M R, Pattie Maes +1 more
The web is littered with images, once created for human consumption and now increasingly interpreted by agents using vision-language models (VLMs)....
1 months ago cs.CV cs.AI
PDF
Defense MEDIUM
David Puertolas Merenciano, Ekaterina Vasyagina, Raghav Dixit +4 more
LoRA adapters let users fine-tune large language models (LLMs) efficiently. However, LoRA adapters are shared through open repositories like Hugging...
1 months ago cs.CR cs.AI cs.CL
PDF
Defense MEDIUM
Tianyu Chen, Dongrui Liu, Xia Hu +2 more
Clawdbot is a self-hosted, tool-using personal AI agent with a broad action space spanning local execution and web-mediated workflows, which raises...
1 months ago cs.CR cs.AI
PDF
Defense MEDIUM
George Alexandru Adam, Alexander Cui, Edwin Thomas +7 more
While historical considerations surrounding text authenticity revolved primarily around plagiarism, the advent of large language models (LLMs) has...
Defense LOW
Jiyong Uhm, Minseok Kim, Michalis Polychronakis +1 more
Binary code analysis plays an essential role in cybersecurity, facilitating reverse engineering to reveal the inner workings of programs in the...
1 months ago cs.CR cs.LG
PDF
Defense MEDIUM
Zhaoxin Wang, Jiaming Liang, Fengbin Zhu +5 more
Large language models (LLMs) and multimodal LLMs are typically safety-aligned before release to prevent harmful content generation. However, recent...
Defense MEDIUM
Yujun Zhou, Yue Huang, Han Bao +8 more
While most AI alignment research focuses on preventing models from generating explicitly harmful content, a more subtle risk is emerging:...
1 months ago cs.LG cs.CL
PDF
Defense MEDIUM
Christian Rondanini, Barbara Carminati, Elena Ferrari +2 more
The proliferation of edge devices has created an urgent need for security solutions capable of detecting malware in real time while operating under...
1 months ago cs.CR cs.AI cs.DC
PDF
Defense MEDIUM
Md Sazedur Rahman, Mizanur Rahman Jewel, Sanjay Madria
Mining is rapidly evolving into an AI driven cyber physical ecosystem where safety and operational reliability depend on robust perception,...
1 months ago cs.CR cs.DC
PDF
Defense MEDIUM
Adel ElZemity, Joshua Sylvester, Budi Arief +1 more
SMS-based phishing (smishing) attacks have surged, yet training effective on-device detectors requires labelled threat data that quickly becomes...
Defense HIGH
Samal Mukhtar, Yinghua Yao, Zhu Sun +3 more
Software vulnerability detection (SVD) is a critical challenge in modern systems. Large language models (LLMs) offer natural-language explanations...
1 months ago cs.SE cs.AI cs.CR
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial