Attack HIGH
Xingyu Zhu, Beier Zhu, Shuo Wang +4 more
As vision-language models (VLMs) are increasingly deployed in open-world scenarios, they can be easily induced by visual jailbreak attacks to...
Attack HIGH
Zihui Chen, Yuling Wang, Pengfei Jiao +4 more
Text-attributed graphs (TAGs) enhance graph learning by integrating rich textual semantics and topological context for each node. While boosting...
Attack HIGH
Yasamin Medghalchi, Milad Yazdani, Amirhossein Dabiriaghdam +7 more
Ultrasound is widely used in clinical practice due to its portability, cost-effectiveness, safety, and real-time imaging capabilities. However, image...
Attack HIGH
Matta Varun, Ajay Kumar Dhakar, Yuan Hong +1 more
Graph neural network (GNN) is a powerful tool for analyzing graph-structured data. However, their vulnerability to adversarial attacks raises serious...
4 days ago cs.LG cs.CR
PDF
Attack HIGH
Yusheng Zheng, Yiwei Yang, Wei Zhang +1 more
LLM agent frameworks increasingly offer checkpoint-restore for error recovery and exploration, advising developers to make external tool calls safe...
Attack HIGH
Wenjing Hong, Zhonghua Rong, Li Wang +5 more
Large Language Models (LLMs) have been widely deployed, especially through free Web-based applications that expose them to diverse user-generated...
5 days ago cs.CR cs.AI
PDF
Attack HIGH
Toan Tran, Olivera Kotevska, Li Xiong
Membership inference attacks (MIAs), which enable adversaries to determine whether specific data points were part of a model's training dataset, have...
6 days ago cs.CR cs.LG
PDF
Attack HIGH
Aravind Krishnan, Karolina Stańczak, Dietrich Klakow
As Spoken Language Models (SLMs) integrate speech and text modalities, they inherit the safety vulnerabilities of their LLM backbone and an expanded...
Attack HIGH
Sheng Liu, Panos Papadimitratos
FL has emerged as a transformative paradigm for ITS, notably camera-based Road Condition Classification (RCC). However, by enabling collaboration,...
6 days ago cs.CR cs.AI cs.DC
PDF
Attack HIGH
Mohammadhossein Homaei, Iman Khazrak, Rubén Molano +2 more
Industrial Cyber-Physical Systems (ICPS) face growing threats from cyber-attacks that exploit sensor and control vulnerabilities. Digital Twin (DT)...
6 days ago cs.CR cs.LG
PDF
Attack HIGH
Jiahao Zhang, Yilong Wang, Suhang Wang
Graph neural networks (GNNs) are widely used for learning from graph-structured data in domains such as social networks, recommender systems, and...
6 days ago cs.LG cs.CR
PDF
Attack HIGH
Kun Wang, Meng Chen, Junhao Wang +6 more
With the widespread deployment of deep-learning-based speech models in security-critical applications, backdoor attacks have emerged as a serious...
1 weeks ago cs.CR cs.LG cs.SD
PDF
Attack HIGH
Zhihua Wei, Qiang Li, Jian Ruan +4 more
Large vision-language models (VLMs) often exhibit weakened safety alignment with the integration of the visual modality. Even when text prompts...
1 weeks ago cs.CV cs.AI
PDF
Attack HIGH
Hammad Atta, Ken Huang, Kyriakos Rock Lambros +11 more
Agentic LLM systems equipped with persistent memory, RAG pipelines, and external tool connectors face a class of attacks - Logic-layer Prompt Control...
Attack HIGH
Shenao Yan, Shimaa Ahmed, Shan Jin +4 more
Code generation large language models (LLMs) are increasingly integrated into modern software development workflows. Recent work has shown that these...
1 weeks ago cs.CR cs.AI cs.SE
PDF
Attack HIGH
Yong Zou, Haoran Li, Fanxiao Li +5 more
Recent progress in image generation models (IGMs) enables high-fidelity content creation but also amplifies risks, including the reproduction of...
1 weeks ago cs.CV cs.AI cs.CR
PDF
Attack HIGH
Guangsheng Zhang, Huan Tian, Leo Zhang +4 more
Semantic segmentation models are widely deployed in safety-critical applications such as autonomous driving, yet their vulnerability to backdoor...
Attack HIGH
Deng Liu, Song Chen
Hardware faults, specifically bit-flips in quantized weights, pose a severe reliability threat to Large Language Models (LLMs), often triggering...
Attack HIGH
Xiaobing Sun, Perry Lam, Shaohua Li +4 more
Modern LLMs employ safety mechanisms that extend beyond surface-level input filtering to latent semantic representations and generation-time...
Attack HIGH
Mateusz Dziemian, Maxwell Lin, Xiaohan Fu +28 more
LLM based agents are increasingly deployed in high stakes settings where they process external data sources such as emails, documents, and code...
1 weeks ago cs.CR cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial