Attack HIGH
Jona te Lintelo, Lichao Wu, Stjepan Picek
The rapid adoption of Mixture-of-Experts (MoE) architectures marks a major shift in the deployment of Large Language Models (LLMs). MoE LLMs improve...
Survey LOW
Shae McFadden, Myles Foley, Elizabeth Bates +5 more
Deep Reinforcement Learning (DRL) has achieved remarkable success in domains requiring sequential decision-making, motivating its application to...
1 months ago cs.LG cs.CR
PDF
Attack HIGH
Yanzhang Fu, Zizheng Guo, Jizhou Luo
Score-based query attacks pose a serious threat to deep learning models by crafting adversarial examples (AEs) using only black-box access to model...
1 months ago cs.LG cs.CR
PDF
Attack HIGH
Scott Thornton
Hybrid Retrieval-Augmented Generation (RAG) pipelines combine vector similarity search with knowledge graph expansion for multi-hop reasoning. We...
1 months ago cs.CR cs.IR cs.LG
PDF
Defense MEDIUM
Yukun Jiang, Hai Huang, Mingjie Li +3 more
By introducing routers to selectively activate experts in Transformer layers, the mixture-of-experts (MoE) architecture significantly reduces...
1 months ago cs.LG cs.AI cs.CR
PDF
Benchmark LOW
Ahmed Salem, Andrew Paverd, Sahar Abdelnabi
Large language models (LLMs) are commonly treated as stateless: once an interaction ends, no information is assumed to persist unless it is...
1 months ago cs.LG cs.AI cs.CR
PDF
Benchmark MEDIUM
Igor Santos-Grueiro
Safety evaluation for advanced AI systems assumes that behavior observed under evaluation predicts behavior in deployment. This assumption weakens...
1 months ago cs.AI cs.CR cs.LG
PDF
Benchmark MEDIUM
Pouria Arefijamal, Mahdi Ahmadlou, Bardia Safaei +1 more
Federated learning (FL) is a decentralized learning paradigm widely adopted in resource-constrained Internet of Things (IoT) environments. These...
1 months ago cs.LG cs.CR cs.DC
PDF
Attack MEDIUM
Benjamin Livshits
We argue that when it comes to producing secure code with AI, the prevailing "fighting fire with fire" approach -- using probabilistic AI-based...
1 months ago cs.CR cs.AI cs.SE
PDF
Benchmark HIGH
Yuhang Wang, Feiming Xu, Zheng Lin +6 more
Although large language model (LLM)-based agents, exemplified by OpenClaw, are increasingly evolving from task-oriented systems into personalized AI...
Benchmark MEDIUM
Liwen Wang, Zongjie Li, Yuchong Xie +4 more
The evolution of Large Language Models (LLMs) into agentic systems that perform autonomous reasoning and tool use has created significant...
1 months ago cs.AI cs.CR
PDF
Benchmark MEDIUM
Shadman Rabby, Md. Hefzul Hossain Papon, Sabbir Ahmed +3 more
Sycophancy in Vision-Language Models (VLMs) refers to their tendency to align with user opinions, often at the expense of moral or factual accuracy....
Tool HIGH
Xiaoxu Peng, Dong Zhou, Jianwen Zhang +3 more
Vision Language Models (VLMs) have advanced perception in autonomous driving (AD), but they remain vulnerable to adversarial threats. These risks...
1 months ago cs.CV eess.IV
PDF
Attack HIGH
Sahar Zargarzadeh, Mohammad Islam
The Internet of Things (IoT) has revolutionized connectivity by linking billions of devices worldwide. However, this rapid expansion has also...
1 months ago cs.CR cs.LG
PDF
Attack LOW
Pengyu Chang, Yixiong Fang, Silin Chen +3 more
Software testing is a critical, yet resource-intensive phase of the software development lifecycle. Over the years, various automated tools have been...
Attack HIGH
Md Rafi Ur Rashid, MD Sadik Hossain Shanto, Vishnu Asutosh Dasu +1 more
Vision-Language Models (VLMs) are now a core part of modern AI. Recent work proposed several visual jailbreak attacks using single/ holistic images....
1 months ago cs.CV cs.AI
PDF
Defense MEDIUM
Shayan Ali Hassan, Tao Ni, Zafar Ayyub Qazi +1 more
Large Language Models (LLMs) have demonstrated remarkable capabilities in natural language understanding, reasoning, and generation. However, these...
1 months ago cs.LG cs.CR
PDF
Benchmark HIGH
Nanda Rani, Kimberly Milner, Minghao Shao +9 more
Real-world offensive security operations are inherently open-ended: attackers explore unknown attack surfaces, revise hypotheses under uncertainty,...
1 months ago cs.CR cs.AI cs.MA
PDF
Attack HIGH
Minbeom Kim, Mihir Parmar, Phillip Wallis +5 more
AI agents equipped with tool-calling capabilities are susceptible to Indirect Prompt Injection (IPI) attacks. In this attack scenario, malicious...
1 months ago cs.CR cs.LG stat.ME
PDF
Tool HIGH
Tianyi Wang, Huawei Fan, Yuanchao Shu +2 more
Large Language Models face an emerging and critical threat known as latency attacks. Because LLM inference is inherently expensive, even modest...
1 months ago cs.CR cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial