Tool MEDIUM
Reva Schwartz, Carina Westling, Morgan Briggs +12 more
This paper proposes CIRCLE, a six-stage, lifecycle-based framework to bridge the reality gap between model-centric performance metrics and AI's...
3 weeks ago cs.AI cs.SE
PDF
Attack MEDIUM
Qianxun Xu, Chenxi Song, Yujun Cai +1 more
Recent advances in text-to-video diffusion models have enabled high-fidelity and temporally coherent videos synthesis. However, current models are...
Attack MEDIUM
Qianxun Xu, Chenxi Song, Yujun Cai +1 more
Recent advances in text-to-video diffusion models have enabled high-fidelity and temporally coherent videos synthesis. However, current models are...
Tool MEDIUM
Chuanming Tang, Ling Qing, Shifeng Chen
The rapid evolution of sophisticated cyberattacks has strained modern Security Operations Centers (SOC), which traditionally rely on rule-based or...
3 weeks ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Chung-ju Huang, Huiqiang Zhao, Yuanpeng He +5 more
The increasing reliance on cloud-hosted Large Language Models (LLMs) exposes sensitive client data, such as prompts and responses, to potential...
3 weeks ago cs.CR cs.AI cs.CL
PDF
Tool MEDIUM
Quanjun Zhang, Chengyu Gao, Yu Han +4 more
The rapid advancement of Large Language Models (LLMs) has led to the emergence of intelligent agents capable of autonomously interacting with...
Benchmark MEDIUM
David Condrey
The proliferation of AI-generated text has intensified the need for reliable authorship verification, yet current output-based methods are...
3 weeks ago cs.CR cs.HC cs.LG
PDF
Attack MEDIUM
Idan Habler, Vineeth Sai Narajala, Stav Koren +2 more
Retrieval-Augmented Generation (RAG) systems are essential to contemporary AI applications, allowing large language models to obtain external...
3 weeks ago cs.CR cs.AI
PDF
Attack MEDIUM
Bruce W. Lee, Chen Yueh-Han, Tomek Korbak
Frontier AI agents may pursue hidden goals while concealing their pursuit from oversight. Alignment training aims to prevent such behavior by...
4 weeks ago cs.LG cs.AI
PDF
Defense MEDIUM
Lan Zhang, Chengsi Liang, Zeming Zhuang +4 more
Semantic communication (SemCom) redefines wireless communication from reproducing symbols to transmitting task-relevant semantics. However, this...
4 weeks ago cs.CR eess.SY
PDF
Attack MEDIUM
Sarthak Munshi, Manish Bhatt, Vineeth Sai Narajala +4 more
While prior work has focused on projecting adversarial examples back onto the manifold of natural data to restore safety, we argue that a...
4 weeks ago cs.LG cs.AI cs.CR
PDF
Tool MEDIUM
Kimberly T. Mai, Anna Gausen, Magda Dubois +5 more
AI is increasingly being used to assist fraud and cybercrime. However, it is unclear the extent to which current large language models can provide...
Attack MEDIUM
Inderjeet Singh, Vikas Pahuja, Aishvariya Priya Rathina Sabapathy +8 more
Current stateless defences for multimodal agentic RAG fail to detect adversarial strategies that distribute malicious semantics across retrieval,...
4 weeks ago cs.CR cs.AI cs.CL
PDF
Benchmark MEDIUM
Nazanin Mohammadi Sepahvand, Eleni Triantafillou, Hugo Larochelle +3 more
Large language models (LLMs) trained on webscale data can produce toxic outputs, raising concerns for safe deployment. Prior defenses, based on...
Defense MEDIUM
Xuan Chen, Hao Liu, Tao Yuan +3 more
Traditional phishing website detection relies on static heuristics or reference lists, which lag behind rapidly evolving attacks. While recent...
Defense MEDIUM
Mengxuan Hu, Vivek V. Datla, Anoop Kumar +4 more
Recent advances in alignment techniques such as Supervised Fine-Tuning (SFT), Reinforcement Learning from Human Feedback (RLHF), and Direct...
4 weeks ago cs.CL cs.AI
PDF
Defense MEDIUM
Morteza Eskandarian, Mahdi Rabbani, Arun Kaniyamattam +6 more
The current generation of large language models produces sophisticated social-engineering content that bypasses standard text screening systems in...
Benchmark MEDIUM
Guangnian Wan, Qi Li, Gongfan Fang +2 more
Multimodal Diffusion Language Models (MDLMs) have recently emerged as a competitive alternative to their autoregressive counterparts. Yet their...
4 weeks ago cs.CR cs.LG
PDF
Survey MEDIUM
Yanna Jiang, Delong Li, Haiyu Deng +4 more
Agentic systems increasingly rely on reusable procedural capabilities, \textit{a.k.a., agentic skills}, to execute long-horizon workflows reliably....
4 weeks ago cs.CR cs.AI cs.CE
PDF
Benchmark MEDIUM
Longxiang Wang, Xiang Zheng, Xuhao Zhang +3 more
Multi-tenant LLM serving frameworks widely adopt shared Key-Value caches to enhance efficiency. However, this creates side-channel vulnerabilities...
4 weeks ago cs.CR cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial