Phantasia: Context-Adaptive Backdoors in Vision Language Models
Nam Duong Tran, Phi Le Nguyen
Recent advances in Vision-Language Models (VLMs) have greatly enhanced the integration of visual perception and linguistic reasoning, driving rapid...
2,529+ academic papers on AI security, attacks, and defenses
Showing 41–60 of 312 papers
Clear filtersNam Duong Tran, Phi Le Nguyen
Recent advances in Vision-Language Models (VLMs) have greatly enhanced the integration of visual perception and linguistic reasoning, driving rapid...
Nicolás E. Díaz Ferreyra, Monika Swetha Gurupathi, Zadia Codabux +2 more
Generative Artificial Intelligence (GenAI) has become a central component of many development tools (e.g., GitHub Copilot) that support software...
Labani Halder, Payel Sadhukhan, Sarbani Palit
Ensuring reliability in adversarial settings necessitates treating privacy as a foundational component of data-driven systems. While differential...
Simon Calderon, Niklas Johansson, Onur Günlü
Ensuring ciphertext indistinguishability is fundamental to cryptographic security, but empirically validating this property in real implementations...
Mutsumi Sasaki, Kouta Nakayama, Yusuke Miyao +2 more
When introducing Large Language Models (LLMs) into industrial applications, such as healthcare and education, the risk of generating harmful content...
Xaver Fink, Borja Fernandez Adiego, Daniele Mirarchi +4 more
In this paper, we analyze and improve the adversarial robustness of a convolutional neural network (CNN) that assists crystal-collimator alignment at...
Vinod Vaikuntanathan, Or Zamir
AI agents are increasingly deployed to interact with other agents on behalf of users and organizations. We ask whether two such agents, operated by...
Qiqing Huang, Xingyu Wang, Wanda Guo +2 more
Modern 5G user equipment (UE) processes Radio Resource Control (RRC) configuration messages during early control-plane exchanges, before...
Aobo Chen, Chenxu Zhao, Chenglin Miao +1 more
Large language models (LLMs) possess strong semantic understanding, driving significant progress in data mining applications. This is further...
Vickson Ferrel
As TLS 1.3 encryption limits traditional Deep Packet Inspection (DPI), the security community has pivoted to Euclidean Transformer-based classifiers...
Quanyan Zhu, Zhengye Han
This paper introduces a performative scenario optimization framework for decision-dependent chance-constrained problems. Unlike classical stochastic...
Ruiyang Wang, Rong Pan, Zhengan Yao
Federated learning (FL) enables distributed clients to collaboratively train a global model using local private data. Nevertheless, recent studies...
Ahmed Lekssays
Large Language Models (LLMs) face critical challenges when analyzing security vulnerabilities in real world codebases: token limits prevent loading...
Huamin Chen, Xunzhuo Liu, Bowei He +5 more
Over the past year, the vLLM Semantic Router project has released a series of work spanning: (1) core routing mechanisms -- signal-driven routing,...
Kwanyoung Kim, Byeongsu Sim
Reinforcement learning from human feedback (RLHF) has proven effective in aligning large language models with human preferences, inspiring the...
Abed K. Musaffar, Ambuj Singh, Francesco Bullo
Large language models (LLMs) are increasingly deployed in human-AI teams as support agents for complex tasks such as information retrieval,...
Vicenç Torra, Maria Bras-Amorós
Memory poisoning attacks for Agentic AI and multi-agent systems (MAS) have recently caught attention. It is partially due to the fact that Large...
Qi Luo, Minghui Xu, Dongxiao Yu +1 more
Many learning systems now use graph data in which each node also contains text, such as papers with abstracts or users with posts. Because these...
Dong-Xiao Zhang, Hu Lou, Jun-Jie Zhang +2 more
Adversarial vulnerability in vision and hallucination in large language models are conventionally viewed as separate problems, each addressed with...
Xavier Cadet, Aditya Vikram Singh, Harsh Mamania +6 more
Investigating cybersecurity incidents requires collecting and analyzing evidence from multiple log sources, including intrusion detection alerts,...
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act), and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial