Detecting Cognitive Signatures in Typing Behavior for Non-Intrusive Authorship Verification
David Condrey
The proliferation of AI-generated text has intensified the need for reliable authorship verification, yet current output-based methods are...
2,560+ academic papers on AI security, attacks, and defenses
Showing 381–400 of 1,220 papers
Clear filtersDavid Condrey
The proliferation of AI-generated text has intensified the need for reliable authorship verification, yet current output-based methods are...
Idan Habler, Vineeth Sai Narajala, Stav Koren +2 more
Retrieval-Augmented Generation (RAG) systems are essential to contemporary AI applications, allowing large language models to obtain external...
Bruce W. Lee, Chen Yueh-Han, Tomek Korbak
Frontier AI agents may pursue hidden goals while concealing their pursuit from oversight. Alignment training aims to prevent such behavior by...
Lan Zhang, Chengsi Liang, Zeming Zhuang +4 more
Semantic communication (SemCom) redefines wireless communication from reproducing symbols to transmitting task-relevant semantics. However, this...
Sarthak Munshi, Manish Bhatt, Vineeth Sai Narajala +4 more
While prior work has focused on projecting adversarial examples back onto the manifold of natural data to restore safety, we argue that a...
Kimberly T. Mai, Anna Gausen, Magda Dubois +5 more
AI is increasingly being used to assist fraud and cybercrime. However, it is unclear the extent to which current large language models can provide...
Inderjeet Singh, Vikas Pahuja, Aishvariya Priya Rathina Sabapathy +8 more
Current stateless defences for multimodal agentic RAG fail to detect adversarial strategies that distribute malicious semantics across retrieval,...
Nazanin Mohammadi Sepahvand, Eleni Triantafillou, Hugo Larochelle +3 more
Large language models (LLMs) trained on webscale data can produce toxic outputs, raising concerns for safe deployment. Prior defenses, based on...
Xuan Chen, Hao Liu, Tao Yuan +3 more
Traditional phishing website detection relies on static heuristics or reference lists, which lag behind rapidly evolving attacks. While recent...
Mengxuan Hu, Vivek V. Datla, Anoop Kumar +4 more
Recent advances in alignment techniques such as Supervised Fine-Tuning (SFT), Reinforcement Learning from Human Feedback (RLHF), and Direct...
Morteza Eskandarian, Mahdi Rabbani, Arun Kaniyamattam +6 more
The current generation of large language models produces sophisticated social-engineering content that bypasses standard text screening systems in...
Guangnian Wan, Qi Li, Gongfan Fang +2 more
Multimodal Diffusion Language Models (MDLMs) have recently emerged as a competitive alternative to their autoregressive counterparts. Yet their...
Yanna Jiang, Delong Li, Haiyu Deng +4 more
Agentic systems increasingly rely on reusable procedural capabilities, \textit{a.k.a., agentic skills}, to execute long-horizon workflows reliably....
Longxiang Wang, Xiang Zheng, Xuhao Zhang +3 more
Multi-tenant LLM serving frameworks widely adopt shared Key-Value caches to enhance efficiency. However, this creates side-channel vulnerabilities...
Zac Garby, Andrew D. Gordon, David Sands
A conversation with a large language model (LLM) is a sequence of prompts and responses, with each response generated from the preceding...
Natalie Shapira, Chris Wendler, Avery Yen +35 more
We report an exploratory red-teaming study of autonomous language-model-powered agents deployed in a live laboratory environment with persistent...
Xunzhuo Liu, Huamin Chen, Samzong Lu +27 more
As large language models (LLMs) diversify across modalities, capabilities, and cost profiles, the problem of intelligent request routing -- selecting...
Yedi Zhang, Haoyu Wang, Xianglin Yang +2 more
LLM-enabled applications are rapidly reshaping the software ecosystem by using large language models as core reasoning components for complex task...
Kaiwen Wang, Xiaolin Chang, Yuehan Dong +1 more
Secure comparison is a fundamental primitive in multi-party computation, supporting privacy-preserving applications such as machine learning and data...
Lei Ba, Qinbin Li, Songze Li
LLM-based code interpreter agents are increasingly deployed in critical workflows, yet their robustness against risks introduced by their code...
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act), and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial