Survey LOW
Kele Xu, Yifan Wang, Ming Feng +5 more
Human-computer interaction has traditionally relied on the acoustic channel, a dependency that introduces systemic vulnerabilities to environmental...
Survey LOW
Jiongchi Yu, Xiaolin Wen, Sizhe Cheng +3 more
Fuzz testing is one of the most effective techniques for detecting bugs and vulnerabilities in software. However, as the basis of fuzz testing,...
2 months ago cs.SE cs.HC
PDF
Survey HIGH
Fabrizio Dimino, Bhaskarjit Sarmah, Stefano Pasquali
The rapid adoption of large language models (LLMs) in financial services introduces new operational, regulatory, and security risks. Yet most...
2 months ago q-fin.CP cs.AI cs.CY
PDF
Survey LOW
Xiaolei Zhang, Lu Zhou, Xiaogang Xu +5 more
Artificial Intelligence (AI) agents have evolved from passive predictive tools into active entities capable of autonomous decision-making and...
2 months ago cs.CR cs.AI
PDF
Survey LOW
Xiaolei Zhang, Lu Zhou, Xiaogang Xu +5 more
Artificial Intelligence (AI) agents have evolved from passive predictive tools into active entities capable of autonomous decision-making and...
2 months ago cs.CR cs.AI
PDF
Survey LOW
Saroj Mishra, Suman Niroula, Umesh Yadav +3 more
Retrieval-Augmented Generation (RAG) systems are increasingly evolving into agentic architectures where large language models autonomously coordinate...
2 months ago cs.AI cs.CL cs.CR
PDF
Survey MEDIUM
Elzo Brito dos Santos Filho
AI-assisted software generation has increased development speed, but it has also amplified a persistent engineering problem: systems that are...
2 months ago cs.CR cs.AI
PDF
Survey MEDIUM
G. Madan Mohan, Veena Kiran Nambiar, Kiranmayee Janardhan
We introduce the Dynamic Behavioral Constraint (DBC) benchmark, the first empirical framework for evaluating the efficacy of a structured,...
Survey LOW
Evgenija Popchanovska, Ana Gjorgjevikj, Maryan Rizinski +3 more
Large language models (LLMs) are increasingly embedded in high-stakes workflows, where failures propagate beyond isolated model errors into systemic...
2 months ago cs.CY cs.AI
PDF
Survey MEDIUM
Tatiana Chakravorti, Pranav Narayanan Venkit, Sourojit Ghosh +1 more
Generative AI tools are increasingly entering academic peer review workflows, raising questions about fairness, accountability, and the legitimacy of...
2 months ago cs.CY cs.AI cs.HC
PDF
Survey MEDIUM
Zhihang Deng, Jiaping Gui, Weinan Zhang
Large Language Models (LLMs) are increasingly deployed as agentic systems that plan, memorize, and act in open-world environments. This shift brings...
Survey MEDIUM
Yanna Jiang, Delong Li, Haiyu Deng +4 more
Agentic systems increasingly rely on reusable procedural capabilities, \textit{a.k.a., agentic skills}, to execute long-horizon workflows reliably....
2 months ago cs.CR cs.AI cs.CE
PDF
Survey HIGH
Shruti Srivastava, Kiranmayee Janardhan, Shaurya Jauhari
Cybersecurity threats are becoming increasingly sophisticated, making traditional defense mechanisms and manual red teaming approaches insufficient...
2 months ago cs.CR cs.AI
PDF
Survey LOW
Subhra Jyoti Mandal, Lara Rachidi, Puneet Jain +2 more
Colony-forming unit (CFU) detection is critical in pharmaceutical manufacturing, serving as a key component of Environmental Monitoring programs and...
Survey HIGH
Kunal Mukherjee
Trusted Execution Environments (TEEs) (e.g., Intel SGX and ArmTrustZone) aim to protect sensitive computation from a compromised operating system,...
2 months ago cs.CR cs.AI
PDF
Survey MEDIUM
Kiarash Ahi, Vaibhav Agrawal, Saeed Valizadeh
Large Language Models (LLMs) & Generative AI are transforming cybersecurity, enabling both advanced defenses and new attacks. Organizations now use...
Survey MEDIUM
Boyang Ma, Hechuan Guo, Peizhuo Lv +5 more
Embodied AI systems (e.g., autonomous vehicles, service robots, and LLM-driven interactive agents) are rapidly transitioning from controlled...
2 months ago cs.CR cs.AI
PDF
Survey HIGH
Scott Thornton
AI-assisted code review is widely used to detect vulnerabilities before production release. Prior work shows that adversarial prompt manipulation can...
2 months ago cs.CR cs.AI cs.LG
PDF
Survey MEDIUM
Matic Korun
We propose a geometric taxonomy of large language model hallucinations based on observable signatures in token embedding cluster structure. By...
Survey LOW
Renjun Xu, Yang Yan
The transition from monolithic language models to modular, skill-equipped agents marks a defining shift in how large language models (LLMs) are...
2 months ago cs.MA cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial