AI Security Research
2,077+ academic papers on AI security, attacks, and defenses
Defense LOW
Akio Hayakawa, Stefan Bott, Horacio Saggion
Despite their strong performance, large language models (LLMs) face challenges in real-world application of lexical simplification (LS), particularly...
Defense MEDIUM
Zherui Li, Zheng Nie, Zhenhong Zhou +7 more
The rapid advancement of Diffusion Large Language Models (dLLMs) introduces unprecedented vulnerabilities that are fundamentally distinct from...
5 months ago cs.CL cs.AI
PDF
Defense MEDIUM
Gauri Kholkar, Ratinder Ahuja
As autonomous AI agents are used in regulated and safety-critical settings, organizations need effective ways to turn policy into enforceable...
5 months ago cs.CL cs.AI
PDF
Defense MEDIUM
Yuqiao Meng, Luoxi Tang, Feiyang Yu +4 more
Large language models (LLMs) are increasingly used to help security analysts manage the surge of cyber threats, automating tasks from vulnerability...
5 months ago cs.CR cs.AI
PDF
Defense MEDIUM
Zeyu Shen, Basileal Imana, Tong Wu +3 more
Retrieval-Augmented Generation (RAG) enhances Large Language Models by grounding their outputs in external documents. These systems, however, remain...
5 months ago cs.CR cs.AI
PDF
Defense MEDIUM
Charles E. Gagnon, Steven H. H. Ding, Philippe Charland +1 more
Binary code similarity detection is a core task in reverse engineering. It supports malware analysis and vulnerability discovery by identifying...
5 months ago cs.AI cs.CR cs.SE
PDF
Defense LOW
M. Z. Haider, Tayyaba Noreen, M. Salman
Blockchain Business applications and cryptocurrencies such as enable secure, decentralized value transfer, yet their pseudonymous nature creates...
5 months ago cs.LG cs.AI cs.CR
PDF
Defense MEDIUM
Anton Korznikov, Andrey Galichin, Alexey Dontsov +3 more
Activation steering is a promising technique for controlling LLM behavior by adding semantically meaningful vectors directly into a model's hidden...
6 months ago cs.LG cs.AI
PDF
Defense MEDIUM
Jaehan Kim, Minkyoo Song, Seungwon Shin +1 more
Recent large language models (LLMs) have increasingly adopted the Mixture-of-Experts (MoE) architecture for efficiency. MoE-based LLMs heavily depend...
6 months ago cs.CR cs.AI
PDF
Defense MEDIUM
Wei Huang, De-Tian Chu, Lin-Yuan Bai +6 more
Modern email spam and phishing attacks have evolved far beyond keyword blacklists or simple heuristics. Adversaries now craft multi-modal campaigns...
6 months ago cs.LG cs.CR
PDF
Defense HIGH
Maria Chiper, Radu Tudor Ionescu
Phishing attacks targeting both organizations and individuals are becoming an increasingly significant threat as technology advances. Current...
6 months ago cs.CR cs.AI cs.CL
PDF
Defense LOW
Dana A Abdullah, Dana Rasul Hamad, Bishar Rasheed Ibrahim +3 more
Altered fingerprint recognition (AFR) is challenging for biometric verification in applications such as border control, forensics, and fiscal...
6 months ago cs.CV cs.CR cs.LG
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial