Benchmark LOW
Zahra Mahdavi, Zahra Khodakaramimaghsoud, Hooman Khaloo +4 more
Large vision-language models (LVLMs) are now central to healthcare applications such as medical visual question answering and imaging report...
Benchmark MEDIUM
Xinyun Zhou, Xinfeng Li, Yinan Peng +9 more
Retrieval-Augmented Generation (RAG) systems are increasingly central to robust AI, enhancing large language model (LLM) faithfulness by...
5 months ago cs.CR cs.AI cs.CL
PDF
Benchmark MEDIUM
Qingyuan Fei, Xin Liu, Song Li +4 more
Researchers have proposed numerous methods to detect vulnerabilities in JavaScript, especially those assisted by Large Language Models (LLMs)....
5 months ago cs.CR cs.CL cs.SE
PDF
Benchmark LOW
Jianxiang Zang, Yongda Wei, Ruxue Bai +5 more
Reliable reward models (RMs) are critical for ensuring the safe alignment of large language models (LLMs). However, current RM evaluation methods...
Benchmark MEDIUM
Yongyu Wang
Graph Neural Networks (GNNs) have emerged as a dominant paradigm for learning on graph-structured data, thanks to their ability to jointly exploit...
5 months ago cs.LG cs.CR
PDF
Benchmark MEDIUM
Yining Yuan, Yifei Wang, Yichang Xu +3 more
This paper presents LLMBugScanner, a large language model (LLM) based framework for smart contract vulnerability detection using fine-tuning and...
5 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Kai Williams, Rohan Subramani, Francis Rhys Ward
Frontier AI developers may fail to align or control highly-capable AI agents. In many cases, it could be useful to have emergency shutdown mechanisms...
5 months ago cs.CR cs.AI cs.CY
PDF
Benchmark HIGH
Jiawei Chen, Yang Yang, Chao Yu +6 more
Large Reasoning Models (LRMs) have emerged as a powerful advancement in multi-step reasoning tasks, offering enhanced transparency and logical...
5 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Aayush Garg, Zanis Ali Khan, Renzo Degiovanni +1 more
Automated vulnerability patching is crucial for software security, and recent advancements in Large Language Models (LLMs) present promising...
5 months ago cs.CR cs.AI cs.SE
PDF
Benchmark LOW
Peng Kuang, Xiangxiang Wang, Wentao Liu +2 more
Multimodal Large Language Models (MLLMs) have achieved impressive performances in mathematical reasoning, yet they remain vulnerable to visual...
Benchmark MEDIUM
Anudeex Shetty
Large Language Models (LLMs) have demonstrated exceptional capabilities in natural language understanding and generation. Based on these LLMs,...
5 months ago cs.CL cs.CR cs.LG
PDF
Benchmark MEDIUM
Abeer Matar A. Almalky, Ziyan Wang, Mohaiminul Al Nahian +2 more
In recent years, large language models (LLMs) have achieved substantial advancements and are increasingly integrated into critical applications...
Benchmark MEDIUM
Mohaiminul Al Nahian, Abeer Matar A. Almalky, Gamana Aragonda +6 more
Adversarial weight perturbation has emerged as a concerning threat to LLMs that either use training privileges or system-level access to inject...
Benchmark MEDIUM
Gauri Pradhan, Joonas Jälkö, Santiago Zanella-Bèguelin +1 more
Training machine learning models with differential privacy (DP) limits an adversary's ability to infer sensitive information about the training data....
5 months ago cs.CR cs.LG
PDF
Benchmark LOW
Junjian Wang, Lidan Zhao, Xi Sheryl Zhang
Ensuring the safety of embodied AI agents during task planning is critical for real-world deployment, especially in household environments where...
Benchmark MEDIUM
Rebeka Toth, Tamas Bisztray, Richard Dubniczky
Phishing and spam emails remain a major cybersecurity threat, with attackers increasingly leveraging Large Language Models (LLMs) to craft highly...
5 months ago cs.CR cs.AI cs.DB
PDF
Benchmark MEDIUM
Rebeka Toth, Tamas Bisztray, Nils Gruschka
In this paper, we introduce a metadata-enriched generation framework (PhishFuzzer) that seeds real emails into Large Language Models (LLMs) to...
5 months ago cs.CR cs.AI cs.DB
PDF
Benchmark MEDIUM
Di Zhu, Chen Xie, Ziwei Wang +1 more
New York City reports over one hundred thousand motor vehicle collisions each year, creating substantial injury and public health burden. We present...
Benchmark MEDIUM
Momoko Shiraishi, Yinzhi Cao, Takahiro Shinagawa
Command-line interface (CLI) fuzzing tests programs by mutating both command-line options and input file contents, thus enabling discovery of...
Benchmark MEDIUM
Xuebo Qiu, Mingqi Lv, Yimei Zhang +4 more
Provenance-based threat hunting identifies Advanced Persistent Threats (APTs) on endpoints by correlating attack patterns described in Cyber Threat...
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial