Attack MEDIUM
Jiajie Zhu, Xia Du, Xiaoyuan Liu +4 more
The rapid advancements in artificial intelligence have significantly accelerated the adoption of speech recognition technology, leading to its...
4 months ago cs.SD cs.CR cs.MM
PDF
Attack HIGH
M P V S Gopinadh, S Mahaboob Hussain
Large Language Models (LLMs) are integral to modern AI applications, but their safety alignment mechanisms can be bypassed through adversarial prompt...
4 months ago cs.CR cs.AI
PDF
Attack LOW
Zhenhong Zhou, Shilinlu Yan, Chuanpu Liu +3 more
Large language models (LLMs) are increasingly deployed in cost-sensitive and on-device scenarios, and safety guardrails have advanced mainly in...
Attack HIGH
Md Mahbub Hasan, Marcus Sternhagen, Krishna Chandra Roy
Additive manufacturing (AM) is rapidly integrating into critical sectors such as aerospace, automotive, and healthcare. However, this cyber-physical...
4 months ago cs.CR cs.AI cs.LG
PDF
Attack MEDIUM
Nandish Chattopadhyay, Abdul Basit, Amira Guesmi +3 more
Adversarial attacks pose a significant challenge to the reliable deployment of machine learning models in EdgeAI applications, such as autonomous...
4 months ago cs.CR cs.AI
PDF
Attack MEDIUM
Fumiya Morimoto, Ryuto Morita, Satoshi Ono
Deep neural network-based classifiers are prone to errors when processing adversarial examples (AEs). AEs are minimally perturbed input data...
4 months ago cs.CR cs.LG cs.NE
PDF
Attack HIGH
Haoran Gu, Handing Wang, Yi Mei +2 more
The widespread deployment of large language models (LLMs) has raised growing concerns about their misuse risks and associated safety issues. While...
4 months ago cs.CR cs.CL
PDF
Attack MEDIUM
Xiaoze Liu, Weichen Yu, Matt Fredrikson +2 more
The open-weight language model ecosystem is increasingly defined by model composition techniques (such as weight merging, speculative decoding, and...
4 months ago cs.LG cs.CL cs.CR
PDF
Attack HIGH
Manish Bhatt, Adrian Wood, Idan Habler +1 more
Production LLM agents with tool-using capabilities require security testing despite their safety training. We adapt Go-Explore to evaluate...
4 months ago cs.CR cs.AI cs.LG
PDF
Attack HIGH
Ruben Neyroud, Sam Corley
While most LLMs are autoregressive, diffusion-based LLMs have recently emerged as an alternative method for generation. Greedy Coordinate Gradient...
4 months ago cs.LG cs.CL cs.CR
PDF
Attack LOW
Yalin E. Sagduyu, Tugba Erpek, Aylin Yener +1 more
Semantic communications conveys task-relevant meaning rather than focusing solely on message reconstruction, improving bandwidth efficiency and...
4 months ago cs.NI cs.AI cs.CR
PDF
Attack MEDIUM
Pankayaraj Pathmanathan, Michael-Andrei Panaitescu-Liess, Cho-Yu Jason Chiang +1 more
Retrieval-Augmented Generation (RAG) has emerged as a promising paradigm to enhance large language models (LLMs) with external knowledge, reducing...
Attack HIGH
Yuan Xin, Dingfan Chen, Linyi Yang +2 more
As large language models (LLMs) are increasingly deployed, ensuring their safe use is paramount. Jailbreaking, adversarial prompts that bypass model...
4 months ago cs.CR cs.AI cs.CL
PDF
Attack MEDIUM
Ruixuan Huang, Qingyue Wang, Hantao Huang +4 more
Mixture-of-Experts architectures have become the standard for scaling large language models due to their superior parameter efficiency. To...
4 months ago cs.CR cs.LG
PDF
Attack HIGH
Roee Ziv, Raz Lapid, Moshe Sipper
Audio-language models combine audio encoders with large language models to enable multimodal reasoning, but they also introduce new security...
4 months ago cs.SD cs.AI cs.CR
PDF
Attack HIGH
Jiawei Liu, Zhuo Chen, Rui Zhu +4 more
Neural ranking models have achieved remarkable progress and are now widely deployed in real-world applications such as Retrieval-Augmented Generation...
4 months ago cs.CR cs.IR
PDF
Attack HIGH
Zhen Liang, Hai Huang, Zhengkui Chen
Large language models (LLMs), such as ChatGPT, have achieved remarkable success across a wide range of fields. However, their trustworthiness remains...
4 months ago cs.CR cs.AI
PDF
Attack HIGH
Soham Padia, Dhananjay Vaidya, Ramchandra Mangrulkar
Securing blockchain-enabled IoT networks against sophisticated adversarial attacks remains a critical challenge. This paper presents a trust-based...
4 months ago cs.CR cs.LG cs.MA
PDF
Attack HIGH
Zongmin Zhang, Zhen Sun, Yifan Liao +5 more
Prompt-driven Video Segmentation Foundation Models (VSFMs) such as SAM2 are increasingly deployed in applications like autonomous driving and digital...
4 months ago cs.CV cs.CR
PDF
Attack LOW
Jiayu Hu, Beibei Li, Jiangwei Xia +3 more
While Vision-Language Models (VLMs) have garnered increasing attention in the AI community due to their promising practical applications, they...
4 months ago cs.CV cs.LG
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial