Survey LOW
Dominik Schwarz
As Large Language Models (LLMs) are increasingly integrated into automated, multi-stage pipelines, risk patterns that arise from unvalidated trust...
4 months ago cs.CR cs.AI
PDF
Attack MEDIUM
Haohua Duan, Liyao Xiang, Xin Zhang
Watermarking schemes for large language models (LLMs) have been proposed to identify the source of the generated text, mitigating the potential...
4 months ago cs.CR cs.CL cs.LG
PDF
Other LOW
Qiumeng Li, Xinxi Yang, Suhong Zhou
As emerging mobility modes continue to expand, many cities face declining bus ridership, increasing fiscal pressure to sustain underutilized routes,...
Attack MEDIUM
Lisha Shuai, Jiuling Dong, Nan Zhang +5 more
Local Differential Privacy (LDP) is a widely adopted privacy-protection model in the Internet of Things (IoT) due to its lightweight, decentralized,...
Defense MEDIUM
Weifei Jin, Yuxin Cao, Junjie Su +5 more
Recent advances in Audio-Language Models (ALMs) have significantly improved multimodal understanding capabilities. However, the introduction of the...
4 months ago cs.SD cs.CR cs.LG
PDF
Benchmark MEDIUM
Zheng Zhang, Haonan Li, Xingyu Li +2 more
Bug bisection has been an important security task that aims to understand the range of software versions impacted by a bug, i.e., identifying the...
Benchmark HIGH
Kaiwen Zhou, Ahmed Elgohary, A S M Iftekhar +1 more
The ability of LLM agents to plan and invoke tools exposes them to new safety risks, making a comprehensive red-teaming system crucial for...
4 months ago cs.CR cs.AI cs.CL
PDF
Benchmark MEDIUM
André V. Duarte, Xuying li, Bin Zeng +3 more
If we cannot inspect the training data of a large language model (LLM), how can we ever know what it has seen? We believe the most compelling...
Survey MEDIUM
Robert A. Bridges, Thomas R. Mitchell, Mauricio Muñoz +1 more
The advent of Large Language Models (LLMs) promised to resolve the long-standing paradox in honeypot design, achieving high-fidelity deception with...
Benchmark LOW
Emily Herron, Junqi Yin, Feiyi Wang
Large language models (LLMs) have demonstrated transformative potential in scientific research, yet their deployment in high-stakes contexts raises...
Benchmark MEDIUM
Simon Yu, Peilin Yu, Hongbo Zheng +3 more
We present VISAT, a novel open dataset and benchmarking suite for evaluating model robustness in the task of traffic sign recognition with the...
4 months ago cs.CR cs.AI cs.LG
PDF
Tool MEDIUM
Ken Huang, Kyriakos Rock Lambros, Jerry Huang +8 more
This paper introduces the Agentic AI Governance Assurance & Trust Engine (AAGATE), a Kubernetes-native control plane designed to address the unique...
4 months ago cs.CR cs.AI
PDF
Benchmark LOW
He Hu, Chiyuan Ma, Qianning Wang +5 more
The shortage of mental health professionals has driven the web to become a primary avenue for accessible psychological support. While Large Language...
Defense LOW
Abha Jha, Abel Salinas, Fred Morstatter
The rise of Large Language Models (LLMs) offers transformative potential for interpreting complex legal frameworks, such as Title 18 Section 175 of...
Attack MEDIUM
Guangzhi Su, Shuchang Huang, Yutong Ke +3 more
Multimodal large language models (MLLMs) have achieved impressive performance across diverse tasks by jointly reasoning over textual and visual...
4 months ago cs.LG cs.CR
PDF
Attack LOW
Svetlana Churina, Niranjan Chebrolu, Kokil Jaidka
We show that continual pretraining on plausible misinformation can overwrite specific factual knowledge in large language models without degrading...
4 months ago cs.LG cs.CR
PDF
Benchmark MEDIUM
Zheng Zhang, Guanlong Wu, Sen Deng +2 more
In the rapidly expanding landscape of Large Language Model (LLM) applications, real-time output streaming has become the dominant interaction...
Benchmark MEDIUM
Juan Ren, Mark Dras, Usman Naseem
Agentic methods have emerged as a powerful and autonomous paradigm that enhances reasoning, collaboration, and adaptive control, enabling systems to...
Attack HIGH
Zirui Cheng, Jikai Sun, Anjun Gao +4 more
Large language models (LLMs) have transformed natural language processing (NLP), enabling applications from content generation to decision support....
4 months ago cs.CR cs.IR cs.LG
PDF
Attack MEDIUM
Elizabeth Lin, Jonah Ghebremichael, William Enck +5 more
Software supply chains, while providing immense economic and software development value, are only as strong as their weakest link. Over the past...
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial