Attack MEDIUM
Neusha Javidnia, Ruisi Zhang, Ashish Kundu +1 more
We present SWaRL, a robust and fidelity-preserving watermarking framework designed to protect the intellectual property of code LLM owners by...
2 months ago cs.CR cs.LG
PDF
Benchmark LOW
Sunny Gupta, Shounak Das, Amit Sethi
Vision language foundation models such as CLIP exhibit impressive zero-shot generalization yet remain vulnerable to spurious correlations across...
2 months ago cs.CV cs.AI cs.LG
PDF
Defense MEDIUM
Maryam Abbasihafshejani, AHM Nazmus Sakib, Murtuza Jadliwala
The rapid advancement of speech synthesis technologies, including text-to-speech (TTS) and voice conversion (VC), has intensified security and...
2 months ago cs.SD cs.AI cs.CR
PDF
Benchmark MEDIUM
Antonio Colacicco, Vito Guida, Dario Di Palma +2 more
Large Language Models (LLMs) are increasingly applied in recommendation scenarios due to their strong natural language understanding and generation...
2 months ago cs.IR cs.AI cs.CL
PDF
Attack HIGH
Alexandre Le Mercier, Chris Develder, Thomas Demeester
State space models (SSMs) like Mamba offer efficient alternatives to Transformer-based language models, with linear time complexity. Yet, their...
Attack HIGH
Alexandre Le Mercier, Chris Develder, Thomas Demeester
State space models (SSMs) like Mamba offer efficient alternatives to Transformer-based language models, with linear time complexity. Yet, their...
Defense HIGH
Yun Bian, Yi Chen, HaiQuan Wang +2 more
Software vulnerability detection can be formulated as a binary classification problem that determines whether a given code snippet contains security...
2 months ago cs.SE cs.AI cs.CR
PDF
Attack MEDIUM
Jiwei Guan, Haibo Jin, Haohan Wang
Recent advancements in Large Vision-Language Models (LVLMs) have shown groundbreaking capabilities across diverse multimodal tasks. However, these...
2 months ago cs.CR cs.AI cs.CV
PDF
Benchmark LOW
Bin Xu
AI agents -- systems that combine foundation models with reasoning, planning, memory, and tool use -- are rapidly becoming a practical interface...
Benchmark MEDIUM
Jinwei Hu, Xinmiao Huang, Youcheng Sun +2 more
As large language models (LLMs) transition to autonomous agents synthesizing real-time information, their reasoning capabilities introduce an...
2 months ago cs.CL cs.AI cs.MA
PDF
Tool MEDIUM
Arina Kharlamova, Youcheng Sun, Ting Yu
Private macOS frameworks underpin critical services and daemons but remain undocumented and distributed only as stripped binaries, complicating...
2 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Junyu Liu, Zirui Li, Qian Niu +7 more
As Large Language Models (LLMs) are increasingly deployed in healthcare field, it becomes essential to carefully evaluate their medical safety before...
2 months ago cs.CL cs.AI
PDF
Tool HIGH
Xin Wang, Yunhao Chen, Juncheng Li +7 more
The rapid integration of Multimodal Large Language Models (MLLMs) into critical applications is increasingly hindered by persistent safety...
2 months ago cs.CR cs.CV
PDF
Benchmark HIGH
Songyang Liu, Chaozhuo Li, Rui Pu +5 more
Jailbreak attacks present a significant challenge to the safety of Large Language Models (LLMs), yet current automated evaluation methods largely...
2 months ago cs.CR cs.CL
PDF
Survey MEDIUM
Huan Lin Oh, Jay Yong Jun Jie, Mandy Lee Ling Siu +1 more
Cybersecurity post-incident reviews are essential for identifying control failures and improving organisational resilience, yet they remain...
2 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Muntasir Adnan, Carlos C. N. Kuhn
Large Language Models have become integral to software development, yet they frequently generate vulnerable code. Existing code vulnerability...
2 months ago cs.SE cs.AI
PDF
Attack MEDIUM
Davis Brown, Juan-Pablo Rivera, Dan Hendrycks +1 more
As frontier AIs become more powerful and costly to develop, adversaries have increasing incentives to steal model weights by mounting exfiltration...
2 months ago cs.CR cs.AI cs.LG
PDF
Benchmark MEDIUM
Zhuoran Tan, Run Hao, Jeremy Singer +2 more
Tool-augmented LLM agents raise new security risks: tool executions can introduce runtime-only behaviors, including prompt injection and unintended...
2 months ago cs.CR cs.SE
PDF
Attack MEDIUM
Jiajie Zhu, Xia Du, Xiaoyuan Liu +4 more
The rapid advancements in artificial intelligence have significantly accelerated the adoption of speech recognition technology, leading to its...
2 months ago cs.SD cs.CR cs.MM
PDF
Defense LOW
Rajiv Thummala, Katherine Winton, Luke Flores +2 more
Out-of-band screening of microcontrollers is a major gap in semiconductor supply chain security. High-assurance techniques such as X-ray and...
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial