IU: Imperceptible Universal Backdoor Attack
Hsin Lin, Yan-Lun Chen, Ren-Hung Hwang +1 more
Backdoor attacks pose a critical threat to the security of deep neural networks, yet existing efforts on universal backdoors often rely on visually...
2,077+ academic papers on AI security, attacks, and defenses
Showing 281–300 of 341 papers
Clear filtersHsin Lin, Yan-Lun Chen, Ren-Hung Hwang +1 more
Backdoor attacks pose a critical threat to the security of deep neural networks, yet existing efforts on universal backdoors often rely on visually...
Zihang Wang, Xu Li, Benwu Wang +7 more
Explainability and transparent decision-making are essential for the safe deployment of autonomous driving systems. Scene captioning summarizes...
Yilian Liu, Xiaojun Jia, Guoshun Nan +6 more
Multimodal Large Language Models (MLLMs) have achieved remarkable performance but remain vulnerable to jailbreak attacks that can induce harmful...
Ming Wen, Kun Yang, Xin Chen +4 more
Multimodal Large Language Models (MLLMs) pose critical safety challenges, as they are susceptible not only to adversarial attacks such as...
Swapnil Parekh
Image captioning models are encoder-decoder architectures trained on large-scale image-text datasets, making them susceptible to adversarial attacks....
Haodong Zhao, Jinming Hu, Zhaomin Wu +7 more
Federated Instruction Tuning (FIT) enables collaborative instruction tuning of large language models across multiple organizations (clients) in a...
Jingyuan Xie, Wenjie Wang, Ji Wu +1 more
Supervised fine-tuning (SFT) is essential for the development of medical large language models (LLMs), yet prior poisoning studies have mainly...
Linxi Jiang, Zhijie Liu, Haotian Luo +1 more
Browser-use agents are widely used for everyday tasks. They enable automated interaction with web pages through structured DOM based interfaces or...
Yijun Yu
Agentic AI systems exhibit numerous crosscutting concerns -- security, observability, cost management, fault tolerance -- that are poorly modularized...
Chang Xue, Fang Liu, Jiaye Wang +2 more
Decentralized financial platforms rely heavily on Web of Trust reputation systems to mitigate counterparty risk in the absence of centralized...
Om Tailor
Colluding language-model agents can hide coordination in messages that remain policy-compliant at the surface level. We present CLBC, a protocol...
Rahul Baxi
AI agents are increasingly granted economic agency (executing trades, managing budgets, negotiating contracts, and spawning sub-agents), yet current...
Yashas Hariprasad, Subhash Gurappa, Sundararaj S. Iyengar +3 more
The Forensics Investigations Network in Digital Sciences (FINDS) Research Center of Excellence (CoE), funded by the U.S. Army Research Laboratory,...
Reva Schwartz, Carina Westling, Morgan Briggs +12 more
This paper proposes CIRCLE, a six-stage, lifecycle-based framework to bridge the reality gap between model-centric performance metrics and AI's...
Xingyu Zhu, Kesen Zhao, Liang Yi +4 more
Multimodal large language models (MLLMs) have achieved remarkable progress in vision-language reasoning, yet they remain vulnerable to hallucination,...
Zhicheng Fang, Jingjie Zheng, Chenxu Fu +1 more
Jailbreak techniques for large language models (LLMs) evolve faster than benchmarks, making robustness estimates stale and difficult to compare...
Qianxun Xu, Chenxi Song, Yujun Cai +1 more
Recent advances in text-to-video diffusion models have enabled high-fidelity and temporally coherent videos synthesis. However, current models are...
Qianxun Xu, Chenxi Song, Yujun Cai +1 more
Recent advances in text-to-video diffusion models have enabled high-fidelity and temporally coherent videos synthesis. However, current models are...
Xuhui Dou, Hayretdin Bahsi, Alejandro Guerra-Manzanares
Recent work applies Large Language Models (LLMs) to source-code vulnerability detection, but most evaluations still rely on random train-test splits...
Chuanming Tang, Ling Qing, Shifeng Chen
The rapid evolution of sophisticated cyberattacks has strained modern Security Operations Centers (SOC), which traditionally rely on rule-based or...
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act), and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial