Benchmark MEDIUM
Yihan Liao, Jacky Keung, Xiaoxue Ma +2 more
The rapid advancement of Large Language Models (LLMs) has been driven by extensive datasets that may contain sensitive information, raising serious...
Benchmark MEDIUM
Ruozhao Yang, Mingfei Cheng, Gelei Deng +3 more
Penetration testing is essential for assessing and strengthening system security against real-world threats, yet traditional workflows remain highly...
3 months ago cs.SE cs.AI cs.CR
PDF
Benchmark MEDIUM
Akhil Sharma, Shaikh Yaser Arafat, Jai Kumar Sharma +1 more
The increasing operational reliance on complex Multi-Agent Systems (MAS) across safety-critical domains necessitates rigorous adversarial robustness...
Benchmark MEDIUM
Ali Al Sahili, Ali Chehab, Razane Tajeddine
Large Language Models (LLMs) are prone to memorizing training data, which poses serious privacy risks. Two of the most prominent concerns are...
3 months ago cs.LG cs.CL cs.CR
PDF
Benchmark MEDIUM
Md Nahid Hasan Shuvo, Moinul Hossain
Connected autonomous vehicles (CAVs) rely on vision-based deep neural networks (DNNs) and low-latency (Vehicle-to-Everything) V2X communication to...
3 months ago cs.CV cs.AI cs.CR
PDF
Benchmark MEDIUM
Sanjay Das, Swastik Bhattacharya, Shamik Kundu +3 more
State-space models (SSMs), exemplified by the Mamba architecture, have recently emerged as state-of-the-art sequence-modeling frameworks, offering...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Luoxi Meng, Henry Feng, Ilia Shumailov +1 more
Browser-using agents (BUAs) are an emerging class of AI agents that interact with web browsers in human-like ways, including clicking, scrolling,...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Arastoo Zibaeirad, Marco Vieira
Large Language Models (LLMs) are increasingly being studied for Software Vulnerability Detection (SVD) and Repair (SVR). Individual LLMs have...
3 months ago cs.SE cs.AI
PDF
Benchmark MEDIUM
Xin Yang, Omid Ardakanian
Data obfuscation is a promising technique for mitigating attribute inference attacks by semi-trusted parties with access to time-series data emitted...
3 months ago cs.LG cs.CR
PDF
Benchmark MEDIUM
Edward Lue Chee Lip, Anthony Channg, Diana Kim +2 more
As AI capabilities advance, we increasingly rely on powerful models to decompose complex tasks $\unicode{x2013}$ but what if the decomposer itself is...
3 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Han Yang, Shaofeng Li, Tian Dong +3 more
Deep Neural Networks (DNNs), as valuable intellectual property, face unauthorized use. Existing protections, such as digital watermarking, are...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
N Mangala, Murtaza Rangwala, S Aishwarya +5 more
Healthcare has become exceptionally sophisticated, as wearables and connected medical devices are revolutionising remote patient monitoring,...
3 months ago cs.CR cs.DC
PDF
Benchmark MEDIUM
Jan Betley, Jorio Cocola, Dylan Feng +4 more
LLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow...
3 months ago cs.CL cs.AI cs.CR
PDF
Benchmark MEDIUM
Aink Acrie Soe Thein, Nikolaos Pitropakis, Pavlos Papadopoulos +2 more
With the adoption of multiple digital devices in everyday life, the cyber-attack surface has increased. Adversaries are continuously exploring new...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Xinye Cao, Yihan Lin, Guoshun Nan +9 more
Zero-Touch Networks (ZTNs) represent a transformative paradigm toward fully automated and intelligent network management, providing the scalability...
3 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Gary Ackerman, Zachary Kallenborn, Anna Wetzel +7 more
The potential for rapidly-evolving frontier artificial intelligence (AI) models, especially large language models (LLMs), to facilitate bioterrorism...
3 months ago cs.LG cs.AI cs.CY
PDF
Benchmark MEDIUM
Md Nazmul Haque, Elizabeth Lin, Lawrence Arkoh +2 more
Large Language Models for code (LLMs4Code) are increasingly used to generate software artifacts, including library and package recommendations in...
Benchmark MEDIUM
Lukas Johannes Möller
The escalating sophistication and variety of cyber threats have rendered static honeypots inadequate, necessitating adaptive, intelligence-driven...
3 months ago cs.CR cs.DC cs.LG
PDF
Benchmark MEDIUM
Jordan Taylor, Sid Black, Dillon Bowen +10 more
Future AI systems could conceal their capabilities ('sandbagging') during evaluations, potentially misleading developers and auditors. We...
Benchmark MEDIUM
JV Roig
We investigate how large language models (LLMs) fail when operating as autonomous agents with tool-use capabilities. Using the Kamiwaza Agentic Merit...
3 months ago cs.AI cs.SE
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial