The Attribution Story of WhisperGate: An Academic Perspective
Oleksandr Adamov, Anders Carlsson
This paper explores the challenges of cyberattack attribution, specifically APTs, applying the case study approach for the WhisperGate cyber...
2,077+ academic papers on AI security, attacks, and defenses
Showing 1681–1700 of 2,034 papers
Clear filtersOleksandr Adamov, Anders Carlsson
This paper explores the challenges of cyberattack attribution, specifically APTs, applying the case study approach for the WhisperGate cyber...
Yasser Hamidullah, Koel Dutta Chowdhury, Yusser Al Ghussin +4 more
Hallucination, where models generate fluent text unsupported by visual evidence, remains a major flaw in vision-language models and is particularly...
Yixuan Liu, Xinlei Li, Yi Li
Phishing attacks in Web3 ecosystems are increasingly sophisticated, exploiting deceptive contract logic, malicious frontend scripts, and token...
Gyeonghoon Park, Jaehan Kim, Jinu Choi +1 more
Host-based cryptomining malware, commonly known as cryptojackers, have gained notoriety for their stealth and the significant financial losses they...
Zheng Zhang, Jiarui He, Yuchen Cai +4 more
As large language model (LLM) agents increasingly automate complex web tasks, they boost productivity while simultaneously introducing new security...
Lei Li, Xiao Zhou, Yingying Zhang +1 more
Medical question answering (QA) requires extensive access to domain-specific knowledge. A promising direction is to enhance large language models...
Jiahao Shi, Tianyi Zhang
Despite recent advances, Large Language Models (LLMs) still generate vulnerable code. Retrieval-Augmented Generation (RAG) has the potential to...
Pranshav Gajjar, Molham Khoja, Abiodun Ganiyu +4 more
The impending adoption of Open Radio Access Network (O-RAN) is fueling innovation in the RAN towards data-driven operation. Unlike traditional RAN...
Chengquan Guo, Yuzhou Nie, Chulin Xie +3 more
As large language models (LLMs) are increasingly used for code generation, concerns over the security risks have grown substantially. Early research...
Isaac Wu, Michael Maslowski
As large language models (LLMs) become integrated into various sensitive applications, prompt injection, the use of prompting to induce harmful...
Roberto Brusnicki, David Pop, Yuan Gao +2 more
Autonomous driving systems remain critically vulnerable to the long-tail of rare, out-of-distribution scenarios with semantic anomalies. While Vision...
Neeladri Bhuiya, Madhav Aggarwal, Diptanshu Purwar
Large Language Models (LLMs) are improving at an exceptional rate. With the advent of agentic workflows, multi-turn dialogue has become the de facto...
Qilin Liao, Anamika Lochab, Ruqi Zhang
Vision-Language Models (VLMs) extend large language models with visual reasoning, but their multimodal design also introduces new, underexplored...
Xu Zhang, Hao Li, Zhichao Lu
Multimodal Large Language Models (MLLMs) achieve strong reasoning and perception capabilities but are increasingly vulnerable to jailbreak attacks....
Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca +2 more
Federated Learning (FL) enables collaborative training of Machine Learning (ML) models across multiple clients while preserving their privacy. Rather...
Yushi Yang, Shreyansh Padarha, Andrew Lee +1 more
Agentic reinforcement learning (RL) trains large language models to autonomously call tools during reasoning, with search as the most common...
Xinkai Wang, Beibei Li, Zerui Shao +3 more
Multimodal large language models (MLLMs) have become integral to a wide range of real-world applications by jointly reasoning over text and visual...
Rishi Jha, Harold Triedman, Justin Wagle +1 more
Control-flow hijacking attacks manipulate orchestration mechanisms in multi-agent systems into performing unsafe actions that compromise the system...
Giulia Giusti
The concept of linearity plays a central role in both mathematics and computer science, with distinct yet complementary meanings. In mathematics,...
Runlin Lei, Lu Yi, Mingguo He +4 more
While Graph Neural Networks (GNNs) and Large Language Models (LLMs) are powerful approaches for learning on Text-Attributed Graphs (TAGs), a...
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act), and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial