Attack MEDIUM
Mohammad Mahdi Razmjoo, Mohammad Mahdi Sharifian, Saeed Bagheri Shouraki
Despite their remarkable performance, deep neural networks exhibit a critical vulnerability: small, often imperceptible, adversarial perturbations...
3 months ago cs.LG cs.CR cs.CV
PDF
Attack MEDIUM
Li Lin, Siyuan Xin, Yang Cao +1 more
Watermarking large language models (LLMs) is vital for preventing their misuse, including the fabrication of fake news, plagiarism, and spam. It is...
3 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Sanjay Das, Swastik Bhattacharya, Shamik Kundu +3 more
State-space models (SSMs), exemplified by the Mamba architecture, have recently emerged as state-of-the-art sequence-modeling frameworks, offering...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Luoxi Meng, Henry Feng, Ilia Shumailov +1 more
Browser-using agents (BUAs) are an emerging class of AI agents that interact with web browsers in human-like ways, including clicking, scrolling,...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Arastoo Zibaeirad, Marco Vieira
Large Language Models (LLMs) are increasingly being studied for Software Vulnerability Detection (SVD) and Repair (SVR). Individual LLMs have...
3 months ago cs.SE cs.AI
PDF
Survey MEDIUM
J. Alexander Curtis, Nasir U. Eisty
Penetration testing is a cornerstone of cybersecurity, traditionally driven by manual, time-intensive processes. As systems grow in complexity, there...
Defense MEDIUM
Dang-Khoa Nguyen, Gia-Thang Ho, Quang-Minh Pham +5 more
Software supply chain attacks targeting the npm ecosystem have become increasingly sophisticated, leveraging obfuscation and complex logic to evade...
Attack MEDIUM
Hua Ma, Ruoxi Sun, Minhui Xue +4 more
Accurate time-series forecasting is increasingly critical for planning and operations in low-carbon power systems. Emerging time-series large...
3 months ago cs.CR cs.LG
PDF
Tool MEDIUM
Padmeswari Nandiya, Ahmad Mohsin, Ahmed Ibrahim +2 more
Industry 5.0's increasing integration of IT and OT systems is transforming industrial operations but also expanding the cyber-physical attack...
Benchmark MEDIUM
Xin Yang, Omid Ardakanian
Data obfuscation is a promising technique for mitigating attribute inference attacks by semi-trusted parties with access to time-series data emitted...
3 months ago cs.LG cs.CR
PDF
Benchmark MEDIUM
Edward Lue Chee Lip, Anthony Channg, Diana Kim +2 more
As AI capabilities advance, we increasingly rely on powerful models to decompose complex tasks $\unicode{x2013}$ but what if the decomposer itself is...
3 months ago cs.CR cs.AI
PDF
Defense MEDIUM
Andrew Adiletta, Kathryn Adiletta, Kemal Derya +1 more
The rapid deployment of Large Language Models (LLMs) has created an urgent need for enhanced security and privacy measures in Machine Learning (ML)....
3 months ago cs.CR cs.AI
PDF
Attack MEDIUM
Jamal Al-Karaki, Muhammad Al-Zafar Khan, Rand Derar Mohammad Al Athamneh
The scarcity of cyberattack data hinders the development of robust intrusion detection systems. This paper introduces PHANTOM, a novel adversarial...
3 months ago cs.CR cs.AI cs.LG
PDF
Survey MEDIUM
Alexander K. Saeri, Sophia Lloyd George, Jess Graham +4 more
Organizations and governments that develop, deploy, use, and govern AI must coordinate on effective risk mitigation. However, the landscape of AI...
3 months ago cs.CY cs.AI
PDF
Defense MEDIUM
Manon Kempermann, Sai Suresh Macharla Vasu, Mahalakshmi Raveenthiran +2 more
Safety evaluations of large language models (LLMs) typically focus on universal risks like dangerous capabilities or undesirable propensities....
3 months ago cs.AI cs.CY
PDF
Attack MEDIUM
Neha, Tarunpreet Bhatia
Intrusion Detection Systems (IDS) are critical components in safeguarding 5G/6G networks from both internal and external cyber threats. While...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Han Yang, Shaofeng Li, Tian Dong +3 more
Deep Neural Networks (DNNs), as valuable intellectual property, face unauthorized use. Existing protections, such as digital watermarking, are...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
N Mangala, Murtaza Rangwala, S Aishwarya +5 more
Healthcare has become exceptionally sophisticated, as wearables and connected medical devices are revolutionising remote patient monitoring,...
3 months ago cs.CR cs.DC
PDF
Defense MEDIUM
Najmul Hasan, Prashanth BusiReddyGari, Haitao Zhao +3 more
Email phishing is one of the most prevalent and globally consequential vectors of cyber intrusion. As systems increasingly deploy Large Language...
3 months ago cs.CR cs.IR
PDF
Benchmark MEDIUM
Jan Betley, Jorio Cocola, Dylan Feng +4 more
LLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow...
3 months ago cs.CL cs.AI cs.CR
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial