Attack HIGH
Harsh Chaudhari, Ethan Rathbun, Hanna Foerster +5 more
Chain-of-Thought (CoT) reasoning has emerged as a powerful technique for enhancing large language models' capabilities by generating intermediate...
1 months ago cs.CR cs.LG
PDF
Defense HIGH
Zihan Wu, Jie Xu, Yun Peng +2 more
Large Language Models (LLMs) struggle to automate real-world vulnerability detection due to two key limitations: the heterogeneity of vulnerability...
1 months ago cs.SE cs.AI
PDF
Attack HIGH
Gabriel Lee Jun Rong, Christos Korgialas, Dion Jia Xu Ho +3 more
Existing automated attack suites operate as static ensembles with fixed sequences, lacking strategic adaptation and semantic awareness. This paper...
Attack HIGH
Alexandra Chouldechova, A. Feder Cooper, Solon Barocas +3 more
We argue that conclusions drawn about relative system safety or attack method efficacy via AI red teaming are often not supported by evidence...
Benchmark HIGH
Thomas Heverin
Prompt injection evaluations typically treat refusal as a stable, binary indicator of safety. This study challenges that paradigm by modeling refusal...
Benchmark HIGH
Zelong Zheng, Jiayuan Zhou, Xing Hu +2 more
Software vulnerability management has become increasingly critical as modern systems scale in size and complexity. However, existing automated...
Tool HIGH
Qi Li, Xinchao Wang
Enabling large language models (LLMs) to solve complex reasoning tasks is a key step toward artificial general intelligence. Recent work augments...
Tool HIGH
Narek Maloyan, Dmitry Namiot
The Model Context Protocol (MCP) has emerged as a de facto standard for integrating Large Language Models with external tools, yet no formal security...
2 months ago cs.CR cs.AI
PDF
Attack HIGH
Narek Maloyan, Dmitry Namiot
The proliferation of agentic AI coding assistants, including Claude Code, GitHub Copilot, Cursor, and emerging skill-based architectures, has...
Attack HIGH
Chen Ling, Kai Hu, Hangcheng Liu +3 more
Large Vision-Language Models (LVLMs) are increasingly deployed in real-world intelligent systems for perception and reasoning in open physical...
2 months ago cs.CV cs.AI
PDF
Attack HIGH
Mohammad Zare, Pirooz Shamsinejadbabaki
Membership inference attacks (MIAs) pose a serious threat to the privacy of machine learning models by allowing adversaries to determine whether a...
2 months ago cs.CR cs.AI cs.LG
PDF
Attack HIGH
David Condrey
Recent proposals advocate using keystroke timing signals, specifically the coefficient of variation ($δ$) of inter-keystroke intervals, to...
2 months ago cs.CR cs.AI cs.HC
PDF
Attack HIGH
Xing Su, Hao Wu, Hanzhong Liang +4 more
Blockchain systems are increasingly targeted by on-chain attacks that exploit contract vulnerabilities to extract value rapidly and stealthily,...
2 months ago cs.CR cs.SE
PDF
Attack HIGH
Jivnesh Sandhan, Fei Cheng, Tushar Sandhan +1 more
Large Language Models (LLMs) are increasingly deployed in domains such as education, mental health and customer support, where stable and consistent...
Attack HIGH
Fengheng Chu, Jiahao Chen, Yuhong Wang +4 more
While Large Language Models (LLMs) are aligned to mitigate risks, their safety guardrails remain fragile against jailbreak attacks. This reveals...
2 months ago cs.LG cs.CR
PDF
Attack HIGH
Mingyu Yu, Lana Liu, Zhehao Zhao +2 more
The rapid advancement of Multimodal Large Language Models (MLLMs) has introduced complex security challenges, particularly at the intersection of...
2 months ago cs.CV cs.AI
PDF
Attack HIGH
Md Nabi Newaz Khan, Abdullah Arafat Miah, Yu Bi
Graph neural network (GNN) have demonstrated exceptional performance in solving critical problems across diverse domains yet remain susceptible to...
2 months ago cs.LG cs.AI cs.CR
PDF
Attack HIGH
Sahar Tahmasebi, Eric Müller-Budack, Ralph Ewerth
Misinformation and fake news have become a pressing societal challenge, driving the need for reliable automated detection methods. Prior research has...
Attack HIGH
Piyumi Bhagya Sudasinghe, Kushan Sudheera Kalupahana Liyanage, Harsha S. Gardiyawasam Pussewalage
The rapid growth of Internet of Things (IoT) devices has increased the scale and diversity of cyberattacks, exposing limitations in traditional...
Attack HIGH
Zhihao Chen, Zirui Gong, Jianting Ning +2 more
Federated Rank Learning (FRL) is a promising Federated Learning (FL) paradigm designed to be resilient against model poisoning attacks due to its...
2 months ago cs.LG cs.CR cs.DC
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial