Defense MEDIUM
Qingyuan Li, Chenchen Yu, Chuanyi Li +4 more
Vulnerabilities severely threaten software systems, making the timely application of security patches crucial for mitigating attacks. However,...
2 months ago cs.SE cs.CR
PDF
Defense MEDIUM
G M Shahariar, Zabir Al Nazi, Md Olid Hasan Bhuiyan +1 more
Vision Language Models (VLMs) are increasingly integrated into privacy-critical domains, yet existing evaluations of personally identifiable...
2 months ago cs.AI cs.CL cs.CR
PDF
Defense LOW
Jua Han, Jaeyoon Seo, Jungbin Min +2 more
One mistake by an AI system in a safety-critical setting can cost lives. As Large Language Models (LLMs) become integral to robotics decision-making,...
2 months ago cs.AI cs.RO
PDF
Defense LOW
Ilmo Sung
Large language models suffer from "hallucinations"-logical inconsistencies induced by semantic noise. We propose that current architectures operate...
2 months ago cs.LG cond-mat.dis-nn cs.AI
PDF
Defense MEDIUM
Han Zhu, Jiale Chen, Chengkun Cai +8 more
Multi-modal Large Language Models (MLLMs) are increasingly deployed in interactive applications. However, their safety vulnerabilities become...
Defense MEDIUM
Xing Li, Hui-Ling Zhen, Lihao Yin +3 more
This paper presents a comprehensive empirical study on the safety alignment capabilities. We evaluate what matters for safety alignment in LLMs and...
2 months ago cs.CL cs.AI cs.CR
PDF
Defense MEDIUM
Di Wu, Yanyan Zhao, Xin Lu +2 more
Defending against jailbreak attacks is crucial for the safe deployment of Large Language Models (LLMs). Recent research has attempted to improve...
2 months ago cs.AI cs.CL
PDF
Defense MEDIUM
Maryam Abbasihafshejani, AHM Nazmus Sakib, Murtuza Jadliwala
The rapid advancement of speech synthesis technologies, including text-to-speech (TTS) and voice conversion (VC), has intensified security and...
2 months ago cs.SD cs.AI cs.CR
PDF
Defense HIGH
Yun Bian, Yi Chen, HaiQuan Wang +2 more
Software vulnerability detection can be formulated as a binary classification problem that determines whether a given code snippet contains security...
2 months ago cs.SE cs.AI cs.CR
PDF
Defense LOW
Rajiv Thummala, Katherine Winton, Luke Flores +2 more
Out-of-band screening of microcontrollers is a major gap in semiconductor supply chain security. High-assurance techniques such as X-ray and...
Defense MEDIUM
Hyunjun Kim
Guardrail models are essential for ensuring the safety of Large Language Model (LLM) deployments, but processing full multi-turn conversation...
2 months ago cs.CL cs.AI
PDF
Defense MEDIUM
Weijie Wang, Peizhuo Lv, Yan Wang +7 more
Graph Retrieval-Augmented Generation (GraphRAG) has emerged as a key technique for enhancing Large Language Models (LLMs) with proprietary Knowledge...
Defense MEDIUM
Yuchao Hou, Zixuan Zhang, Jie Wang +9 more
As a critical application of computational intelligence in remote sensing, deep learning-based synthetic aperture radar (SAR) image target...
2 months ago cs.CR cs.CV cs.LG
PDF
Defense MEDIUM
Samaresh Kumar Singh, Joyjit Roy, Martin So
Recent attacks on critical infrastructure, including the 2021 Oldsmar water treatment breach and 2023 Danish energy sector compromises, highlight...
2 months ago cs.LG cs.AI cs.CR
PDF
Defense LOW
Alessio Benavoli, Alessandro Facchini, Marco Zaffalon
How can we ensure that AI systems are aligned with human values and remain safe? We can study this problem through the frameworks of the AI...
2 months ago cs.AI cs.GT
PDF
Defense HIGH
Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan +2 more
The software supply chain attacks are becoming more and more focused on trusted development and delivery procedures, so the conventional post-build...
2 months ago cs.CR cs.AI
PDF
Defense LOW
Xingwei Ma, Shiyang Feng, Bo Zhang +1 more
Remote sensing change detection (RSCD), a complex multi-image inference task, traditionally uses pixel-based operators or encoder-decoder networks...
2 months ago cs.CV cs.AI
PDF
Defense LOW
Eranga Bandara, Tharaka Hewa, Ross Gore +12 more
Agentic AI represents a major shift in how autonomous systems reason, plan, and execute multi-step tasks through the coordination of Large Language...
Defense LOW
Long Zhang, Wei-neng Chen
The increasing integration of Large Language Models (LLMs) into decision-making frameworks has exposed significant vulnerabilities to social...
Defense LOW
Le Wang, Zonghao Ying, Xiao Yang +7 more
Embodied agents powered by vision-language models (VLMs) are increasingly capable of executing complex real-world tasks, yet they remain vulnerable...
3 months ago cs.AI cs.CV cs.RO
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial