WAREX: Web Agent Reliability Evaluation on Existing Benchmarks
Su Kara, Fazle Faisal, Suman Nath
Recent advances in browser-based LLM agents have shown promise for automating tasks ranging from simple form filling to hotel booking or online...
2,529+ academic papers on AI security, attacks, and defenses
Showing 2461–2480 of 2,529 papers
Su Kara, Fazle Faisal, Suman Nath
Recent advances in browser-based LLM agents have shown promise for automating tasks ranging from simple form filling to hotel booking or online...
Yihan Wu, Ruibo Chen, Georgios Milis +1 more
As large language models become increasingly capable and widely deployed, verifying the provenance of machine-generated content is critical to...
Alireza Lotfi, Charalampos Katsis, Elisa Bertino
Software vulnerabilities remain a critical security challenge, providing entry points for attackers into enterprise networks. Despite advances in...
Gauri Kholkar, Ratinder Ahuja
As autonomous AI agents are used in regulated and safety-critical settings, organizations need effective ways to turn policy into enforceable...
Meet Udeshi, Venkata Sai Charan Putrevu, Prashanth Krishnamurthy +4 more
Security of software supply chains is necessary to ensure that software updates do not contain maliciously injected code or introduce vulnerabilities...
Shuyi Lin, Tian Lu, Zikai Wang +3 more
OpenAI's GPT-OSS family provides open-weight language models with explicit chain-of-thought (CoT) reasoning and a Harmony prompt format. We summarize...
Nayeong Kim, Seong Joon Oh, Suha Kwak
Parameter-efficient fine-tuning (PEFT) of vision-language models (VLMs) excels in various vision tasks thanks to the rich knowledge and...
Jianshuo Dong, Sheng Guo, Hao Wang +6 more
Search agents connect LLMs to the Internet, enabling them to access broader and more up-to-date information. However, this also introduces a new...
Sihan Hu, Xiansheng Cai, Yuan Huang +5 more
Training large language models with Reinforcement Learning with Verifiable Rewards (RLVR) exhibits a set of distinctive and puzzling behaviors that...
Sherif Saad, Kevin Shi, Mohammed Mamun +1 more
Automated machine learning (AutoML) has emerged as a promising paradigm for automating machine learning (ML) pipeline design, broadening AI adoption....
Yixu Wang, Yan Teng, Yingchun Wang +1 more
Parameter-Efficient Fine-Tuning (PEFT) methods like LoRA have transformed vision model adaptation, enabling the rapid deployment of customized...
Yuqiao Meng, Luoxi Tang, Feiyang Yu +4 more
Large language models (LLMs) are increasingly used to help security analysts manage the surge of cyber threats, automating tasks from vulnerability...
Zhaoqi Wang, Daqing He, Zijian Zhang +4 more
Large language models (LLMs) have demonstrated remarkable capabilities, yet they also introduce novel security challenges. For instance, prompt...
Luxuan Zhang, Douglas Jiang, Qinglong Wang +2 more
Large language models (LLMs) have shown strong ability in generating rich representations across domains such as natural language processing and...
Zeyu Shen, Basileal Imana, Tong Wu +3 more
Retrieval-Augmented Generation (RAG) enhances Large Language Models by grounding their outputs in external documents. These systems, however, remain...
Charles E. Gagnon, Steven H. H. Ding, Philippe Charland +1 more
Binary code similarity detection is a core task in reverse engineering. It supports malware analysis and vulnerability discovery by identifying...
Han Yan, Zheyuan Liu, Meng Jiang
With the rapid advancement of large language models, Machine Unlearning has emerged to address growing concerns around user privacy, copyright...
Francesco Marchiori, Rohan Sinha, Christopher Agia +4 more
Large Language Models (LLMs) and Vision-Language Models (VLMs) are increasingly deployed in robotic environments but remain vulnerable to...
Xiaotian Zou
Multimodal Large Language Models (MLLMs) have transformed text-to-image workflows, allowing designers to create novel visual concepts with...
M. Z. Haider, Tayyaba Noreen, M. Salman
Blockchain Business applications and cryptocurrencies such as enable secure, decentralized value transfer, yet their pseudonymous nature creates...
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act), and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial