Benchmark MEDIUM
Oussama Draissi, Mark Günzel, Ahmad-Reza Sadeghi +1 more
WebAssembly's (Wasm) monolithic linear memory model facilitates memory corruption attacks that can escalate to cross-site scripting in browsers or go...
1 months ago cs.CR cs.LG
PDF
Tool MEDIUM
Aymen Bouferroum, Valeria Loscri, Abderrahim Benslimane
The Industrial Internet of Things (IIoT) introduces significant security challenges as resource-constrained devices become increasingly integrated...
1 months ago cs.CR cs.LG
PDF
Defense LOW
Ao Ding, Hongzong Li, Zi Liang +5 more
Large language models (LLMs) are increasingly deployed on edge devices under strict computation and quantization constraints, yet their security...
1 months ago cs.CR cs.CL cs.LG
PDF
Survey LOW
Shenghan Zheng, Qifan Zhang
AI agent protocols -- including MCP, A2A, ANP, and ACP -- enable autonomous agents to discover capabilities, delegate tasks, and compose services...
Attack HIGH
Qianlong Lan, Anuj Kaul
Deploying large language models (LLMs) as autonomous browser agents exposes a significant attack surface in the form of Indirect Prompt Injection...
1 months ago cs.CR cs.AI
PDF
Survey LOW
Oleksandr Yarotskyi, José D'Abruzzo Pereira, João R. Campos
The widespread adoption of web applications has made their security a critical concern and has increased the need for systematic ways to assess...
Attack HIGH
Xingyu Zhu, Beier Zhu, Shuo Wang +4 more
As vision-language models (VLMs) are increasingly deployed in open-world scenarios, they can be easily induced by visual jailbreak attacks to...
Benchmark MEDIUM
Zhanguang Zhang, Zhiyuan Li, Behnam Rahmati +10 more
Robot action planning in the real world is challenging as it requires not only understanding the current state of the environment but also predicting...
Benchmark MEDIUM
Marco Arazzi, Vignesh Kumar Kembu, Antonino Nocera
Large language models are becoming pervasive core components in many real-world applications. As a consequence, security alignment represents a...
1 months ago cs.CR cs.AI cs.CL
PDF
Defense MEDIUM
Rui Yang Tan, Yujia Hu, Roy Ka-Wei Lee
Multimodal Large Language Models (MLLMs) extend text-only LLMs with visual reasoning, but also introduce new safety failure modes under visually...
1 months ago cs.CR cs.AI cs.MM
PDF
Benchmark LOW
Mohammad Asadi, Jack W. O'Sullivan, Fang Cao +5 more
Multimodal AI systems have achieved remarkable performance across a broad range of real-world tasks, yet the mechanisms underlying visual-language...
Survey MEDIUM
Yanming Mu, Hao Hu, Feiyang Li +7 more
Retrieval-Augmented Generation (RAG) significantly mitigates the hallucinations and domain knowledge deficiency in large language models by...
1 months ago cs.CR cs.AI
PDF
Tool HIGH
Charoes Huang, Xin Huang, Amin Milani Fard
Prompt injection is listed as the number-one vulnerability class in the OWASP Top 10 for LLM Applications that can subvert LLM guardrails, disclose...
1 months ago cs.CR cs.SE
PDF
Benchmark LOW
Zhongyi Li, Wan Tian, Jingyu Chen +8 more
Multi-agent collaboration has emerged as a powerful paradigm for enhancing the reasoning capabilities of large language models, yet it suffers from...
Attack MEDIUM
Huamin Chen, Xunzhuo Liu, Bowei He +5 more
Over the past year, the vLLM Semantic Router project has released a series of work spanning: (1) core routing mechanisms -- signal-driven routing,...
1 months ago cs.LG cs.DC
PDF
Benchmark LOW
Zongjie Li, Chaozheng Wang, Yuchong Xie +2 more
Large Language Models are increasingly being considered for deployment in safety-critical military applications. However, current benchmarks suffer...
1 months ago cs.CY cs.AI
PDF
Attack MEDIUM
Kwanyoung Kim, Byeongsu Sim
Reinforcement learning from human feedback (RLHF) has proven effective in aligning large language models with human preferences, inspiring the...
1 months ago cs.LG cs.AI
PDF
Attack HIGH
Zihui Chen, Yuling Wang, Pengfei Jiao +4 more
Text-attributed graphs (TAGs) enhance graph learning by integrating rich textual semantics and topological context for each node. While boosting...
Tool LOW
Octavian Untila
An autonomous AI ecosystem (SUBSTRATE S3), generating product specifications without explicit instructions about formal methods, independently...
1 months ago cs.SE cs.AI
PDF
Attack HIGH
Yasamin Medghalchi, Milad Yazdani, Amirhossein Dabiriaghdam +7 more
Ultrasound is widely used in clinical practice due to its portability, cost-effectiveness, safety, and real-time imaging capabilities. However, image...
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial