Attack MEDIUM
W. K. M Mithsara, Ning Yang, Ahmed Imteaj +2 more
The widespread integration of wearable sensing devices in Internet of Things (IoT) ecosystems, particularly in healthcare, smart homes, and...
6 months ago cs.LG cs.CR
PDF
Defense LOW
Xiumei Deng, Zehui Xiong, Binbin Chen +3 more
Large language models (LLMs) are proliferating rapidly at the edge, delivering intelligent capabilities across diverse application scenarios....
6 months ago cs.DC cs.AI cs.LG
PDF
Attack MEDIUM
Roy Rinberg, Adam Karvonen, Alexander Hoover +2 more
As large AI models become increasingly valuable assets, the risk of model weight exfiltration from inference servers grows accordingly. An attacker...
6 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Patrick Karlsen, Even Eilertsen
This paper investigates some of the risks introduced by "LLM poisoning," the intentional or unintentional introduction of malicious or biased data...
6 months ago cs.CR cs.AI
PDF
Attack HIGH
Aashray Reddy, Andrew Zagula, Nicholas Saban
Large Language Models (LLMs) remain vulnerable to jailbreaking attacks where adversarial prompts elicit harmful outputs. Yet most evaluations focus...
6 months ago cs.CL cs.AI cs.CR
PDF
Tool HIGH
Xu Liu, Yan Chen, Kan Ling +4 more
The widespread deployment of Large Language Models (LLMs) as public-facing web services and APIs has made their security a core concern for the web...
6 months ago cs.CR cs.LG
PDF
Survey LOW
Yuntao Wang, Siamak P. Najad-Davarani, Elizabeth Bossart +3 more
Background: Modern large language models (LLMs) offer powerful reasoning that converts narratives into structured, taxonomy-aligned data, revealing...
6 months ago physics.med-ph
PDF
Defense LOW
Ahmad Tahmasivand, Noureldin Zahran, Saba Al-Sayouri +2 more
This paper presents LM-Fix, a lightweight detection and rapid recovery framework for faults in large language models (LLMs). Existing integrity...
6 months ago cs.SE cs.AI cs.AR
PDF
Attack HIGH
Chen-Wei Chang, Shailik Sarkar, Hossein Salemi +7 more
Scam detection remains a critical challenge in cybersecurity as adversaries craft messages that evade automated filters. We propose a Hierarchical...
6 months ago cs.CR cs.AI
PDF
Tool LOW
Congcong Chen, Xinyu Liu, Kaifeng Huang +2 more
Graph Neural Networks (GNNs) have marked significant impact in traffic state prediction, social recommendation, knowledge-aware question answering...
6 months ago cs.CR cs.LG
PDF
Attack HIGH
Daniyal Ganiuly, Assel Smaiyl
Large Language Models (LLMs) are increasingly used in intelligent systems that perform reasoning, summarization, and code generation. Their ability...
6 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Hanzhong Liang, Yue Duan, Xing Su +5 more
As the Web3 ecosystem evolves toward a multi-chain architecture, cross-chain bridges have become critical infrastructure for enabling...
Attack HIGH
Hamin Koo, Minseon Kim, Jaehyung Kim
Identifying the vulnerabilities of large language models (LLMs) is crucial for improving their safety by addressing inherent weaknesses. Jailbreaks,...
Survey HIGH
Qin Zhou, Zhexin Zhang, Zhi Li +1 more
With the rapid advancement of AI models, their deployment across diverse tasks has become increasingly widespread. A notable emerging application is...
6 months ago cs.CL cs.CR
PDF
Tool HIGH
Minseok Kim, Hankook Lee, Hyungjoon Koo
Large language models (LLMs) are reshaping numerous facets of our daily lives, leading widespread adoption as web-based services. Despite their...
6 months ago cs.CR cs.AI cs.IR
PDF
Other MEDIUM
Sogol Masoumzadeh
Timely identification of issue reports reflecting software vulnerabilities is crucial, particularly for Internet-of-Things (IoT) where analysis is...
6 months ago cs.SE cs.AI cs.CR
PDF
Benchmark LOW
Siyuan Li, Yaowen Zheng, Hong Li +7 more
In modern software ecosystems, 1-day vulnerabilities pose significant security risks due to extensive code reuse. Identifying vulnerable functions in...
Defense LOW
Ayşe Selin Okatan, Mustafa İlhan Akbaş, Laxima Niure Kandel +1 more
We analyze subliminal transfer in Transformer models, where a teacher embeds hidden traits that can be linearly decoded by a student without...
6 months ago eess.SP cs.AI cs.CR
PDF
Other MEDIUM
Yuhan Cao, Yu Wang, Sitong Liu +3 more
The widespread adoption of Large Language Models (LLMs) through Application Programming Interfaces (APIs) induces a critical vulnerability: the...
6 months ago cs.GT cs.AI
PDF
Attack HIGH
Xin Liu, Aoyang Zhou, Aoyang Zhou
Visual-Language Pre-training (VLP) models have achieved significant performance across various downstream tasks. However, they remain vulnerable to...
6 months ago cs.CV cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial