Attack HIGH
Ye Yu, Haibo Jin, Yaoning Yu +2 more
Large audio-language models increasingly operate on raw speech inputs, enabling more seamless integration across domains such as voice assistants,...
3 months ago cs.CL cs.AI cs.CR
PDF
Attack HIGH
Zhixiang Zhang, Zesen Liu, Yuchong Xie +2 more
Semantic caching has emerged as a pivotal technique for scaling LLM applications, widely adopted by major providers including AWS and Microsoft. By...
3 months ago cs.CR cs.AI
PDF
Attack HIGH
Tanusree Debi, Wentian Zhu
Large language model (LLM) based agents are increasingly used to automate financial transactions, yet their reliance on contextual reasoning exposes...
3 months ago cs.CR cs.AI
PDF
Attack HIGH
Naen Xu, Jinghuai Zhang, Ping He +6 more
Large language models (LLMs) have been widely integrated into critical automated workflows, including contract review and job application processes....
3 months ago cs.CR cs.AI cs.CL
PDF
Attack HIGH
Aarush Noheria, Yuguang Yao
Vision-language models (VLMs) have become central to tasks such as visual question answering, image captioning, and text-to-image generation....
3 months ago cs.CV cs.AI
PDF
Attack HIGH
Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer +1 more
Regression models are widely used in industrial processes, engineering, and in natural and physical sciences, yet their robustness to poisoning has...
3 months ago cs.LG cs.AI cs.CR
PDF
Attack HIGH
Xiaogeng Liu, Xinyan Wang, Yechao Zhang +5 more
Large reasoning models (LRMs) extend large language models with explicit multi-step reasoning traces, but this capability introduces a new class of...
3 months ago cs.CR cs.AI
PDF
Attack HIGH
Ningyuan He, Ronghong Huang, Qianqian Tang +3 more
In-context learning (ICL) has become a powerful, data-efficient paradigm for text classification using large language models. However, its robustness...
Attack HIGH
Xingwei Lin, Wenhao Lin, Sicong Cao +4 more
Multi-turn jailbreak attacks have emerged as a critical threat to Large Language Models (LLMs), bypassing safety mechanisms by progressively...
3 months ago cs.CR cs.AI
PDF
Attack HIGH
Yuetian Chen, Kaiyuan Zhang, Yuntao Du +5 more
Diffusion Language Models (DLMs) represent a promising alternative to autoregressive language models, using bidirectional masked token prediction....
3 months ago cs.LG cs.AI
PDF
Attack HIGH
Md Tasnim Jawad, Mingyan Xiao, Yanzhao Wu
With the widespread adoption of Large Language Models (LLMs) and increasingly stringent privacy regulations, protecting data privacy in LLMs has...
Attack HIGH
Haonan Zhang, Dongxia Wang, Yi Liu +2 more
Safety-aligned LLMs suffer from two failure modes: jailbreak (answering harmful inputs) and over-refusal (declining benign queries). Existing vector...
3 months ago cs.LG cs.AI
PDF
Attack HIGH
Harsh Chaudhari, Ethan Rathbun, Hanna Foerster +5 more
Chain-of-Thought (CoT) reasoning has emerged as a powerful technique for enhancing large language models' capabilities by generating intermediate...
3 months ago cs.CR cs.LG
PDF
Attack HIGH
Gabriel Lee Jun Rong, Christos Korgialas, Dion Jia Xu Ho +3 more
Existing automated attack suites operate as static ensembles with fixed sequences, lacking strategic adaptation and semantic awareness. This paper...
Attack HIGH
Alexandra Chouldechova, A. Feder Cooper, Solon Barocas +3 more
We argue that conclusions drawn about relative system safety or attack method efficacy via AI red teaming are often not supported by evidence...
Attack HIGH
Narek Maloyan, Dmitry Namiot
The proliferation of agentic AI coding assistants, including Claude Code, GitHub Copilot, Cursor, and emerging skill-based architectures, has...
Attack HIGH
Chen Ling, Kai Hu, Hangcheng Liu +3 more
Large Vision-Language Models (LVLMs) are increasingly deployed in real-world intelligent systems for perception and reasoning in open physical...
3 months ago cs.CV cs.AI
PDF
Attack HIGH
Mohammad Zare, Pirooz Shamsinejadbabaki
Membership inference attacks (MIAs) pose a serious threat to the privacy of machine learning models by allowing adversaries to determine whether a...
3 months ago cs.CR cs.AI cs.LG
PDF
Attack HIGH
David Condrey
Recent proposals advocate using keystroke timing signals, specifically the coefficient of variation ($δ$) of inter-keystroke intervals, to...
3 months ago cs.CR cs.AI cs.HC
PDF
Attack HIGH
Xing Su, Hao Wu, Hanzhong Liang +4 more
Blockchain systems are increasingly targeted by on-chain attacks that exploit contract vulnerabilities to extract value rapidly and stealthily,...
3 months ago cs.CR cs.SE
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial